0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000740)=""/3) r7 = shmget$private(0x0, 0x4000, 0x3e4, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0xe7) shmat(r7, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f0000000600), 0x0, 0x40000021, &(0x7f0000000680)) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) faccessat(r1, &(0x7f0000000180)='./file0\x00', 0x10, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:31:24 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x22000, 0x0) 04:31:26 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:26 executing program 5: 04:31:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x10040800) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0xfffffffffffffffe) 04:31:26 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x15) 04:31:26 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='configfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') [ 1452.496392][ T26] kauditd_printk_skb: 21 callbacks suppressed [ 1452.496406][ T26] audit: type=1400 audit(1555821086.983:22354): avc: denied { create } for pid=3848 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=0 04:31:27 executing program 5: 04:31:27 executing program 0: clone(0xfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x1e) [ 1452.584457][ T26] audit: type=1400 audit(1555821087.073:22355): avc: denied { map } for pid=3855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1452.797645][ T26] audit: type=1400 audit(1555821087.293:22356): avc: denied { map } for pid=3862 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:27 executing program 5: [ 1452.868790][ T26] audit: type=1400 audit(1555821087.363:22357): avc: denied { map } for pid=3869 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept4$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000780)={@dev, @broadcast, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000035c0)={@rand_addr, 0x0}, &(0x7f0000003600)=0x14) getpeername$packet(r0, &(0x7f0000003640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000003800)={@initdev, @empty, 0x0}, &(0x7f0000003840)=0xc) accept4$packet(r0, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003900)=0x14, 0x80000) accept$packet(r0, &(0x7f0000003a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003a40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000003a80)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000005180)={@local, 0x0}, &(0x7f00000051c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000005640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000005600)={&(0x7f0000005200)={0x3ec, r4, 0x802, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8aa}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r9}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r11}, {0x134, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5e}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x52}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xa8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r16}}}]}}]}, 0x3ec}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r17 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r17, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r18, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r18, 0x6611) ioctl$LOOP_CTL_ADD(r18, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r19 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r19, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r17, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1452.983168][ T26] audit: type=1400 audit(1555821087.423:22358): avc: denied { map } for pid=3874 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1453.091891][ T26] audit: type=1400 audit(1555821087.423:22359): avc: denied { map } for pid=3871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1453.144717][ T26] audit: type=1400 audit(1555821087.443:22360): avc: denied { map } for pid=3870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1453.179493][ T26] audit: type=1400 audit(1555821087.453:22361): avc: denied { map } for pid=3875 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1453.204179][ T26] audit: type=1400 audit(1555821087.533:22362): avc: denied { map } for pid=3880 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1453.227297][ T26] audit: type=1400 audit(1555821087.543:22363): avc: denied { map } for pid=3882 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:30 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:30 executing program 5: 04:31:30 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80080, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0xd, 0x100, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) 04:31:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x20) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02146003120000002dbd7000ffdbdf2502000100000004d5011e15030000000005001a00ffffffff000000000000000000000000ff0100000000000000000000000000010a001410010014000000000008001200021c0500c06b6e00070000000600ff0006050000fcffffff0000000000008de0000000000000000000000000fe800000000000000000000000001eaa"], 0x90}}, 0x8080) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7a7f6e9c, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d4bed1b705f8800fe800000000000000000000000000000ff02000000000000000000009078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862581934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50932881721afab69cc3712c37ed0000000000000000000"], 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) 04:31:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:31:30 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget$private(0x0, 0x0, 0x400) semctl$GETNCNT(r0, 0x53973f9a7482c80, 0xe, 0x0) 04:31:30 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x7) 04:31:30 executing program 5: 04:31:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:31:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:31:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x4000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:30 executing program 5: 04:31:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:33 executing program 0: clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1000001c) 04:31:33 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:31:33 executing program 5: 04:31:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x71) 04:31:33 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget$private(0x0, 0x2, 0x235) r0 = semget$private(0x0, 0x85ef052b894e7334, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, 0x0) 04:31:33 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:31:33 executing program 5: 04:31:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x6, 0x8800) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640)={0x0, 0x401}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000006c0)={r1, 0x80}, &(0x7f0000000700)=0xc) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSCTTY(r0, 0x540e, 0x846) socket$netlink(0x10, 0x3, 0x1e) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') [ 1458.688666][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 1458.688680][ T26] audit: type=1400 audit(1555821093.183:22384): avc: denied { map } for pid=3939 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:33 executing program 5: [ 1458.845700][ T26] audit: type=1400 audit(1555821093.333:22385): avc: denied { map } for pid=3951 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1458.904912][ T26] audit: type=1400 audit(1555821093.343:22386): avc: denied { map } for pid=3955 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:33 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:31:33 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x100) recvfrom$llc(r0, &(0x7f0000000200)=""/246, 0xf6, 0x1, &(0x7f0000000300)={0x1a, 0x31f, 0x7, 0xee, 0x100, 0x40, @dev={[], 0xe}}, 0x10) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x101, 0x2, 0x4, 0x6b89e09e, 0x0}, &(0x7f0000000080)=0x10) setsockopt(r1, 0x6, 0x2, &(0x7f0000000140)="3039d980a0bc46b7e0458e5dbe6c9496494e3374172375517f73a842c75f580b1ce8c4a75174b6531eaa6ac518f094d117304af53adee0fb13be25b6c789ac519021980130216c7cc0c9c5014e5e6d6eaefe7a917465e60895c045369f6ab0659a9295bafc8db6abeb426eee25e7f77164c794097646dedde6aa9291", 0x7c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x7fff, 0x6, 0x6, 0xfffffffffffffc01, r2}, &(0x7f0000000100)=0x10) [ 1458.936093][ T26] audit: type=1400 audit(1555821093.403:22387): avc: denied { map } for pid=3956 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.032652][ T26] audit: type=1400 audit(1555821093.523:22388): avc: denied { map } for pid=3964 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.089686][ T26] audit: type=1400 audit(1555821093.533:22389): avc: denied { map } for pid=3965 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.129054][ T26] audit: type=1400 audit(1555821093.563:22390): avc: denied { map } for pid=3967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.182449][ T26] audit: type=1400 audit(1555821093.613:22391): avc: denied { map } for pid=3969 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.214104][ T26] audit: type=1400 audit(1555821093.623:22392): avc: denied { map } for pid=3974 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1459.237622][ T26] audit: type=1400 audit(1555821093.663:22393): avc: denied { map } for pid=3975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:36 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(r1, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x5) r5 = shmget$private(0x0, 0x2000, 0x3e4, &(0x7f0000ffb000/0x2000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:36 executing program 5: 04:31:36 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x1, @local}}, 0x1e) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) mq_timedreceive(r0, &(0x7f0000000140)=""/189, 0xbd, 0x9, 0x0) 04:31:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:36 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget$private(0x0, 0x7, 0x200) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000040)=0x7fff) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:36 executing program 5: 04:31:36 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x4000) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x1, 0x5}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x12f03da3, 0x10, 0x0, r0}) socket$netlink(0x10, 0x3, 0x1e) 04:31:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:36 executing program 5: 04:31:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:36 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x10000) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0xec7, 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000380)={0xa, 0x4, 0xfa00, {r1}}, 0xc) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000240)={'broute\x00'}, &(0x7f00000002c0)=0x78) flistxattr(r0, &(0x7f0000000080)=""/173, 0xad) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@null=' \x00', 0xb, 'hsr0\x00'}) socket$netlink(0x10, 0x3, 0x20000000000001e) 04:31:39 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:31:39 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:39 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:39 executing program 5: 04:31:39 executing program 0: clone(0x8b000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:39 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget$private(0x0, 0x3, 0x203) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x80) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) 04:31:39 executing program 5: [ 1465.009710][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 1465.009723][ T26] audit: type=1400 audit(1555821099.503:22414): avc: denied { map } for pid=4038 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:39 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:31:39 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x181a80) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000}) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/241, 0xf1) socket$netlink(0x10, 0x3, 0x1e) [ 1465.069990][ T26] audit: type=1400 audit(1555821099.563:22415): avc: denied { map } for pid=4046 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1465.254982][ T26] audit: type=1400 audit(1555821099.743:22416): avc: denied { map } for pid=4049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:39 executing program 5: 04:31:39 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = shmget$private(0x0, 0x4000, 0x8, &(0x7f0000ffb000/0x4000)=nil) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101a00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r2, 0x30, 0x1, @in6={0xa, 0x4e23, 0xffffffffffff3ba9, @mcast2, 0x9}}}, 0xa0) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/149) socket$netlink(0x10, 0x3, 0x1e) 04:31:39 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1465.348732][ T26] audit: type=1400 audit(1555821099.773:22417): avc: denied { map } for pid=4048 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1465.380607][ T26] audit: type=1400 audit(1555821099.783:22418): avc: denied { map } for pid=4052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1465.407496][ T26] audit: type=1400 audit(1555821099.793:22419): avc: denied { map } for pid=4058 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:39 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x3, 0x4a, 0x1}) [ 1465.431874][ T26] audit: type=1400 audit(1555821099.803:22420): avc: denied { map } for pid=4062 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xd, 0xf, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000080)=0xffff) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1465.583454][ T26] audit: type=1400 audit(1555821100.073:22421): avc: denied { map } for pid=4071 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1465.667055][ T26] audit: type=1400 audit(1555821100.113:22422): avc: denied { map } for pid=4072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1465.752369][ T26] audit: type=1400 audit(1555821100.173:22423): avc: denied { map } for pid=4076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:42 executing program 5: 04:31:42 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x800, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d756e69782c63616368653d667363616368652c646fd4ef5f61707072616973652c736d61636b6673666c6f6f723d2c736d61636b6673666c6f6f723d21766d6e657431409c212c686173682c00"]) socket$netlink(0x10, 0x3, 0x1e) 04:31:42 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8002, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000080)=""/228, &(0x7f0000000180)=0xe4) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:42 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x1e) syz_emit_ethernet(0x61, &(0x7f0000000000)={@dev={[], 0x1c}, @local, [], {@generic={0x1, "0b28c59cf4f8ba1419697befe81479ba1f530149ba4e04ed78e76298f97d2d32ac361858e4f6ebc109c8125cd038fd4150af45feef94b0c103aeecbbb54a12af8646241c8a8ff3e7abd75d0caa9cef27190bb1"}}}, &(0x7f0000000080)={0x1, 0x3, [0x4e2, 0xae0, 0x786, 0xbb6]}) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x5e, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, &(0x7f00000001c0)=0x1c) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000200)={@empty}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', r2}) 04:31:42 executing program 5: 04:31:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 04:31:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:43 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x10000) writev(r0, &(0x7f0000001280)=[{&(0x7f00000000c0)="82a2fc9a12e0f3b1016b2e70417397acc6ac825ec9bd11b593e88c1fc2d3245a863dd47f684fcb083903df1861b28f2875873c51ad7e1cdd89feaadac3bb327d948bbf93c2332bccaf808121a268fd8a92c097a9bd446ab136f9a932b9ae25e87486f7a655eebdcd552a26a258574e84eba2cc4b9ad6da2d84015a28e2", 0x7d}, {&(0x7f0000000140)="585a9b29c528f0641a0358eecb359da0b1ff900862899eca62ada8e55841b0bdcebbbc6a", 0x24}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="96f8cc2bc7a5526cc382cbaec2b8d98eed7514b59ff497454829b3b7d47ca40a19973980828a62cd981eed86031345021275801634c857c73b9a6a4bb0c97b7cd0349b348cc43ba5bc619ea6b9c90c2f7abe308e422aa4bdd3e3e87dd1daa6bc55fc616b0b02989759f36c1cd928b338028a6db28ca1e3a8d7f01062adeb628853419dda666c097111c028a8cad4ef318a2e5cd9956f90d17b6b516eb51b46429216f2a96dc57742e2f91ac9991bf4e1a7509e81db7706ab0f70e51a7cbb610e1d68675219dc2f2d2dfd6abe0a1ef81b27b468c8bf09e81577b82f91bfadbcef6304dfa33f4e5eeb05f5e896fa39", 0xee}], 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x800) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x810}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:31:43 executing program 5: 04:31:43 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x1e) 04:31:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:43 executing program 3: r0 = semget(0x1, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(r0, 0x3, 0xe, 0x0) 04:31:43 executing program 5: 04:31:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:31:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:43 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r1, 0x3}, &(0x7f00000001c0)=0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x84000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e23, 0x2, @empty, 0xff}, {0xa, 0x4e23, 0x1000, @dev={0xfe, 0x80, [], 0xd}, 0x2}, 0x80000000, [0x3, 0x6, 0x7f, 0x17, 0x7, 0xffffffffffff8001, 0x6, 0x3f]}, 0x5c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x800000000000000a, r3, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:43 executing program 5: 04:31:43 executing program 0: clone(0x100004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:44 executing program 5: 04:31:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:44 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x10000, 0x5, 0x1, 0x2, 0x100000000, 0x20, 0x62c0, 0x0, 0x9, 0x1000, 0x85, 0xff, 0x3f, 0x5, 0x5, 0x2}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:44 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x800) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x30, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40084}, 0x4) 04:31:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1470.107659][ T26] kauditd_printk_skb: 46 callbacks suppressed [ 1470.107673][ T26] audit: type=1400 audit(1555821104.603:22470): avc: denied { map } for pid=4217 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1470.184782][ T26] audit: type=1400 audit(1555821104.673:22471): avc: denied { create } for pid=4218 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1470.312314][ T26] audit: type=1400 audit(1555821104.803:22472): avc: denied { map } for pid=4224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1470.967754][ T26] audit: type=1400 audit(1555821105.463:22473): avc: denied { create } for pid=4218 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1471.009120][ T26] audit: type=1400 audit(1555821105.503:22474): avc: denied { map } for pid=4227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:46 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 04:31:46 executing program 5: 04:31:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:46 executing program 0: clone(0x80200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@sg0='ubi%/sg0\x00', &(0x7f0000000380)='.', &(0x7f0000000040)='ubifs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1e) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f0000000480)=[{&(0x7f0000000280)="b886fcd385bc0c47a0d7a26824baeb803b8b3c2688e1e9e6d297ef773b401a5e267bb55167397575920b0ab05aa4d380421ae35a3fb2f5f7a73ddfa29f885ae9f94f48c2576f35cb5e09b791838842f8fc08b51b52a4e4ae1b25e9cc38209965ca82cbbdff4b8ac35146b56ee94bf3097d8a4154310a4afedf4f97cf816eaabfd1ebd85ef28d45d3e78b1210047dd02e9b944c5b5aa005bac8cd880190f293c12161788516f5495ada13364bd90fed0846be23a02948a4616086e2f59651d80fa66908c587bcf847b73a0641b741da18f51f26bcde", 0xd5}, {&(0x7f00000003c0)="cd5b671472d5b90826417e2afff20c8311853c3b1ea8d59f8a36c3323fce0f280cd9f848f22dcf827735f7b1bbc02c9dd54b8635666f36945abadbcb32d211aa3886d25dd2020af2a0e4b4c0ac3025505448f1c073c9322850d32e89a251f9efb28b5a3c83c54535ec494d8d4de59a192caeca49961c126f2ac5f03e611b56d96babcf4ef92ad20a722c", 0x8a}], 0x50, &(0x7f00000004c0)={[{@barrier_flush='barrier=flush'}, {@usrjquota='usrjquota'}]}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x8000, {"758dfbb49db9c8826607310f0ed4f2a2"}, 0x100000001, 0x1ff, 0x6}}}, 0x90) 04:31:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xfffffffffe, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0xffffffffffffffe1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x4000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:46 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1e) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x33a, 0x90480) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1472.272436][ T26] audit: type=1400 audit(1555821106.763:22475): avc: denied { map } for pid=4233 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:46 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:46 executing program 5: 04:31:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffe5e) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}, {}]}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000300)=0x5) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000240)={r2, 0x8, &(0x7f0000000140)=[0x5, 0x970, 0x62b, 0x8, 0x9f, 0xfffffffffffff000, 0x3f, 0x100000000], &(0x7f0000000180)=[0x1f], 0x20, 0x3, 0x6, &(0x7f00000001c0)=[0x2, 0xffffffff, 0x1], &(0x7f0000000200)=[0x5, 0x81]}) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x3, 0x222401) [ 1472.323360][ T4240] UBIFS error (pid: 4240): cannot open "ubi%/sg0", error -22 [ 1472.345281][ T26] audit: type=1400 audit(1555821106.833:22476): avc: denied { map } for pid=4245 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1472.436758][ T26] audit: type=1400 audit(1555821106.933:22477): avc: denied { map } for pid=4246 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1472.524983][ T26] audit: type=1400 audit(1555821107.013:22478): avc: denied { map } for pid=4248 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:47 executing program 0: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e21, @remote}, {0x2, 0x4e23, @broadcast}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='batadv0\x00', 0x401, 0x0, 0x5e}) socket$netlink(0x10, 0x3, 0x1e) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x2) 04:31:47 executing program 5: [ 1472.632917][ T26] audit: type=1400 audit(1555821107.013:22479): avc: denied { map } for pid=4250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:31:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:49 executing program 0: sched_yield() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) 04:31:49 executing program 5: 04:31:49 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget$private(0x0, 0x4, 0x100) r0 = semget(0x1, 0x1, 0x40) semctl$GETNCNT(r0, 0xffffffffffffffff, 0xe, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x0) 04:31:49 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x851db3e895f03294) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000000)=""/219) socket$netlink(0x10, 0x3, 0x1e) socket$bt_hidp(0x1f, 0x3, 0x6) [ 1475.414541][ T26] kauditd_printk_skb: 16 callbacks suppressed [ 1475.414554][ T26] audit: type=1400 audit(1555821109.903:22496): avc: denied { map } for pid=4293 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 5: 04:31:50 executing program 0: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) [ 1475.483747][ T26] audit: type=1400 audit(1555821109.913:22497): avc: denied { map } for pid=4296 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:31:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1475.544747][ T26] audit: type=1400 audit(1555821109.913:22498): avc: denied { map } for pid=4299 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1475.572088][ T26] audit: type=1400 audit(1555821110.013:22499): avc: denied { map } for pid=4308 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x210000) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000100)) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10000000006, 0x40000) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000140)={0x5}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000001c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)={r2, r3}) [ 1475.595768][ T26] audit: type=1400 audit(1555821110.013:22500): avc: denied { map } for pid=4311 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1475.619024][ T26] audit: type=1400 audit(1555821110.063:22501): avc: denied { map } for pid=4315 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1475.710701][ T26] audit: type=1400 audit(1555821110.203:22502): avc: denied { map } for pid=4317 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 5: [ 1475.763208][ T26] audit: type=1400 audit(1555821110.233:22503): avc: denied { map } for pid=4318 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x400000000000001) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="12e31069d6a0fa9c2cda44a28257d9ab596323b740a6f5476095f72aafa511516517a6557d330a601859e1fd536c96f1f0825ce40bcb045bd6dc8c1ec5dfdc17d7e7d2d158cf0e0ddf9ec77232d1def0a4a74808b926769bad6ab4353ed65beb7733324daadca41a7c650fae21543c733e0944addc13756fa8805191c7392fa0ae3aa7ee3c45f17cb8a1e147ff1cbc1047508c981a91f2249c622e958db4b5206a15163aac7dbf416230221b83073c27c8b3242a416720ba", 0xb8}, {&(0x7f00000000c0)="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", 0xfa}, {&(0x7f00000001c0)="144f2765", 0x4}], 0x3, 0x0) [ 1475.946662][ T26] audit: type=1400 audit(1555821110.333:22504): avc: denied { map } for pid=4324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r4 = dup2(r3, r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="117c9f551f457c97f7819d080343000000ffffffff3feebe79a06fbe74d4b3ecfb1f9172983ec5fba97c1a408d520a5bb02d034a039782260d66b7e6f6a2a6a4ee190c8e3899c33a74029780f255d44bc5eeb030000006be46f1000000000001000000001d7b0042936587ac944a336278212a6000"/130], 0x9) ioctl(r5, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r6 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r6, r4, 0x3, 0x0) tee(r4, r6, 0xe9c2, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r7, 0x6611) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) 04:31:50 executing program 5: [ 1475.993289][ T26] audit: type=1400 audit(1555821110.343:22505): avc: denied { map } for pid=4325 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:50 executing program 5: 04:31:50 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) accept4$llc(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80800) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:50 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x20280) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000003c0)={{0x0, 0x2, 0x3, 0x1, 0x8}, 0x2, 0x9}) clone(0x10008003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x20, 0xc0c01) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000340)={0x6, 0x7f, 0x81, 0x8f, &(0x7f0000000140)=""/143, 0x36, &(0x7f0000000200)=""/54, 0xd4, &(0x7f0000000240)=""/212}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x3a480, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000040)="d2390311d9d46c72a32639448cb8cac5c19ee3fa8778a8b31e9be81ab58e0e3fb7aca6c8b4eba38cc77ec72dc059e11512e521020fc0e02f0f3e178398302e2d30efc4e2eacf12908907aa1308d7308323d4ea0e02a8ff9ed3be15baea96b82b680b7baa5901e4e21f68fd7c947fd3c658568debae23083776144a3e103f06a43cdb6696900f2009bc453107f75a", 0x8e) socket$netlink(0x10, 0x3, 0x4) 04:31:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:50 executing program 5: 04:31:53 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1, 0x1b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:31:53 executing program 5: 04:31:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)={0x2}) socket$netlink(0x10, 0x3, 0x1e) 04:31:53 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x800) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3, &(0x7f0000000280)=0x1) getsockname(r0, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80) 04:31:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0xfffffffffb, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) r4 = gettid() perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x7e, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xde2) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x4, 0x1ea) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file1\x00', 0x140) 04:31:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2b9, 0x100) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x100000000, 0x30, 0x1d1c000000, 0x51}, &(0x7f00000000c0)=0x18) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x0, 0x80, 0x7, 0x7}, 0x2, 0x1, 0x0, 0x0, "d01760d68792526c"}, 0x10}, 0x1, 0x0, 0x0, 0x810}, 0x40000) socket$netlink(0x10, 0x3, 0x1e) 04:31:53 executing program 5: 04:31:53 executing program 2: 04:31:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000080)=0x7fffffff) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) socket$netlink(0x10, 0x3, 0x1e) sync_file_range(r0, 0xfffffffffffffffd, 0x10000, 0x5) 04:31:53 executing program 5: 04:31:53 executing program 2: 04:31:53 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000, &(0x7f0000000140), &(0x7f00000001c0)=[0x0]}}], 0x0, 0x0, &(0x7f0000000300)}) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f00000001c0)=0x1) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1d, 0x0, 0x80000, 0x0, 0x0, 0xfff, 0x3}}, 0x50) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, 0x0) 04:31:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1479.338148][ T4430] binder: 4426:4430 transaction failed 29189/-22, size 0-12288 line 2995 [ 1479.353970][ T3724] binder: undelivered TRANSACTION_ERROR: 29189 [ 1479.364265][ T4430] binder: 4426:4430 transaction failed 29189/-22, size 0-12288 line 2995 [ 1479.394475][ T3724] binder: undelivered TRANSACTION_ERROR: 29189 04:31:54 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0xfffffffffffffd46) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) prctl$PR_GET_SECCOMP(0x15) splice(r0, &(0x7f0000000100), r0, &(0x7f0000000140), 0x2, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:31:54 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x1e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv4_newroute={0x44, 0x18, 0x108, 0x70bd25, 0x25dfdbfd, {0x2, 0x80, 0x14, 0x8, 0xff, 0x0, 0xff, 0x7, 0x1900}, [@RTA_IIF={0x8, 0x1, r1}, @RTA_MARK={0x8, 0x10, 0x7}, @RTA_IIF={0x8, 0x1, r2}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1b}}, @RTA_UID={0x8, 0x19, r3}]}, 0x44}}, 0x4000000) 04:31:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, 0x18, 0xfffffffffffffffd, 0x0, 0x0, {0x5}, [@nested={0xc, 0x3, [@typed={0x6, 0x0, @u32}]}]}, 0x20}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 04:31:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x20000000000041, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) r6 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:54 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 04:31:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:54 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x248) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/38) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x480500, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000100)={0x9, 0x9, 0x7, 0x5, 0x7}) r2 = socket$netlink(0x10, 0x3, 0x1e) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000140)=0x7) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000180)=[r2, r2, r2, r3, r3, r2], 0x6) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x3, 0x3}) 04:31:54 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x1e) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xdc, r1, 0x410, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x18f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x478}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x20000010) 04:31:54 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000080)) 04:31:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:54 executing program 0: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) clone(0x800802102002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x2000000c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) 04:31:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1480.526609][ T26] kauditd_printk_skb: 54 callbacks suppressed [ 1480.526661][ T26] audit: type=1804 audit(1555821115.013:22560): pid=4466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir881199346/syzkaller.HsI8Cj/2401/bus" dev="sda1" ino=17632 res=1 [ 1480.593392][ T26] audit: type=1400 audit(1555821115.083:22561): avc: denied { map } for pid=4497 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x3, 0x13012, r0, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x5, 0x200000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x4}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="6f757000000000e00000000000000000"], 0x0, 0x0, 0x3) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000280)=0x17e, 0xffffffffffffffe5) sendmmsg(r2, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 04:31:55 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001, 0x1800}], 0x1) r0 = semget(0x0, 0x1, 0x10) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) getpid() 04:31:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:55 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x1e) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000080)={0xffffffffe5b020d0, 0xf3, 0x0, 0x6}) r2 = socket(0xd, 0x5, 0x9) sendfile(r2, r0, 0x0, 0xfff) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f00000000c0)={0x80, {{0x2, 0x4e23, @rand_addr=0x3}}, {{0x2, 0x4e22, @local}}}, 0x108) bind$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) [ 1480.617569][ T26] audit: type=1804 audit(1555821115.083:22562): pid=4495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir881199346/syzkaller.HsI8Cj/2401/bus" dev="sda1" ino=17632 res=1 04:31:55 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x40, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x800, 0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f0000000240)) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='stat\x00') r10 = open(&(0x7f00000005c0)='./file0\x00', 0x111c01, 0x2) r11 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x20203, 0x0) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x331000, 0x0) r13 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x2000, 0x0) r14 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x94, r1, 0x0, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_SOCKETS={0x54, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}, {0x8, 0x1, r14}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x9}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000044) r15 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r15, 0x84, 0x4, &(0x7f0000000040)=0x8, 0x4) setsockopt$TIPC_GROUP_LEAVE(r15, 0x10f, 0x88) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r12, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socket$netlink(0x10, 0x3, 0x0) [ 1480.707240][ T26] audit: type=1400 audit(1555821115.203:22563): avc: denied { map } for pid=4511 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:55 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget(0x0, 0x7, 0x26) semget(0x2, 0x3, 0x1) semget(0x3, 0x5, 0x0) r0 = semget$private(0x0, 0x3, 0xc5135df6a5fa4546) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) [ 1480.805810][ T26] audit: type=1400 audit(1555821115.203:22564): avc: denied { map } for pid=4502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1480.868242][ T26] audit: type=1400 audit(1555821115.223:22565): avc: denied { map } for pid=4510 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1480.892199][ T26] audit: type=1400 audit(1555821115.233:22566): avc: denied { map } for pid=4509 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:31:55 executing program 0: clone(0x30400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) [ 1480.915895][ T26] audit: type=1400 audit(1555821115.243:22568): avc: denied { map } for pid=4518 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1480.939557][ T26] audit: type=1400 audit(1555821115.243:22567): avc: denied { map } for pid=4515 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1480.962822][ T26] audit: type=1400 audit(1555821115.283:22569): avc: denied { map } for pid=4501 comm="syz-executor.2" path="socket:[299247]" dev="sockfs" ino=299247 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=0 04:31:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000080)=0x7fffffff) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:55 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80180, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x8, 0x0, [], {0x0, @reserved}}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0xff, 0x8]}, 0x8) socket$netlink(0x10, 0x3, 0x1f) 04:31:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pi$s.eveH=\xc3|(s\xf1\xd4RU\x8d\xe7\xdc\xebk\xab', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:56 executing program 0: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x403, 0x1) socket$netlink(0x10, 0x3, 0x1e) 04:31:56 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000080)=0x7fffffff) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:56 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) socket$netlink(0x10, 0x3, 0x1e) 04:31:56 executing program 3: r0 = semget$private(0x0, 0x2, 0x10) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x280, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000100)={0x4fe, 0x3, 0x7c, &(0x7f0000000080)="05f1c91413a90a7583f5479ca13355efaea839bcd8aad30cae22c67456ea5be6bbcccb4a45ae46f4f6dc5f9594a8050e64cce1866adda35d66eb2949565083d91794433da073cb02786ace0806a95d894c41b6993030cef0c4eea8c338893642f3a5aa08ad2a5e4c4b501e05fb17173ee2411b2880e352eb6507287e"}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x9, 0x838, 0xf76a, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800200080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:56 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x7e, 0x1, @buffer={0x0, 0xe1, &(0x7f0000000040)=""/225}, &(0x7f0000000140)="6bef83a79174fc6000df8fb87b7b09b997f60addce7184e8afce9dd678727924d7cb87bfb4f62962ab51cc5103494e77b09e55416c3ead270752972a87b895fe218ac3bd7530b6b97b4edf52e90714d2f26cb93bcbff75e9ba1e616937c9eb3b1a094bf66e73288b449643f7097012f8aa7a6ee862b84ed1e6e836cfc14b", &(0x7f00000001c0)=""/211, 0xfff, 0x16, 0x1, &(0x7f00000002c0)}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:56 executing program 0: clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 04:31:56 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) socket$netlink(0x10, 0x3, 0x1e) 04:31:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:57 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000040)=""/43, &(0x7f0000000080)=0x2b) 04:31:57 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r1 = semget$private(0x0, 0x0, 0x18) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f00000001c0)=""/37) ioctl$NBD_CLEAR_QUE(r0, 0xab05) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@local, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000180)=0xe8) semop(r1, &(0x7f0000000380)=[{0x1, 0x1f, 0x1800}, {0x1, 0x1ff, 0x1000}, {0x2, 0x3, 0x1800}, {0x4, 0x0, 0x800}, {0x2, 0x8b, 0x800}], 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0xfffffffffffffffc, 0x3, "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", 0xf4, 0x48b, 0x1f, 0xc00000000000000, 0x7fffffff, 0x4, 0x39}, r2}}, 0x120) accept$nfc_llcp(r0, &(0x7f0000000580), &(0x7f0000000600)=0x60) r3 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) 04:31:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:57 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000100)=""/52) socket$netlink(0x10, 0x3, 0x1e) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x101002) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:31:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 04:31:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:57 executing program 0: recvmsg(0xffffffffffffff9c, &(0x7f00000014c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000080)=""/96, 0x60}, {&(0x7f0000000100)=""/93, 0x5d}, {&(0x7f0000000180)=""/224, 0xe0}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f0000000380)=""/28, 0x1c}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/94, 0x5e}], 0x7}, 0x0) bind$inet6(r0, &(0x7f0000001500)={0xa, 0x4e22, 0x6, @remote, 0x400}, 0x1c) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) 04:31:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:57 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget(0x1, 0x4, 0x10) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 04:31:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 04:31:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x10000000001, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x4000002, 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:57 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x0, 0x429b7d82}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x10000, 0x2, 0xc0, 0x8000}) 04:31:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x2000000b, &(0x7f0000000040)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bond0\x00', 0x3}, 0x18) 04:31:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_names\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000180)=0x84) socket$netlink(0x10, 0x3, 0x1e) 04:31:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 0: socket$netlink(0x10, 0x3, 0x21) 04:31:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x800000000000, 0x1}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:58 executing program 0: clone(0x800102001bff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept4$x25(r0, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x80800) socket$netlink(0x10, 0x3, 0x1e) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) 04:31:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1e) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x39, "4532097c1209f2607929b4143418c8583fdf6281494b510d8c6b0aa7afb42e9aebada222cf9cf30db9791e987bffa4cc3851159fbdbd02e197"}, &(0x7f00000000c0)=0x41) epoll_create(0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r0, 0x8}, &(0x7f0000000140)=0x8) 04:31:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:58 executing program 0: clone(0x20802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)=0x0) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001a00)=0xe8) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x200, 0xa, &(0x7f0000001680)=[{&(0x7f0000000080)="42f838eb1783bc19c24c52828305ec342fd97500e5dc8a6661dc34cf13c7cb6f99c1696b63d24dbd84b3570c69fbd8cdccd9373cb5aadb4d98776ff724403027c0a4e193d5938fba3bf82e7da15e5c1d37bb896cdbb8e3cc89ac22fe7d11b1651608e77c3224dde0fa84f223db6799a7fc477a7a3c1423e181c8", 0x7a, 0xff}, {&(0x7f0000000100)="a86986e2aeba3819534dbbe71786139f0892bd6015edc2823bf0442f940f3aab7132a418419a7c3b3b3f6df005ca8ceddeaab59327da6b0043b067cbc0d1fdd768e60a67b9cd9d4ffd30f88cab02262f776febc6bf02bc892c441246835079bb94d96a5ebe6170bccd7e8311caee91a1091d0fa1a054b37cc6d81bd85f3dd39793d86b67ca6d07f0a88b71a4bda3a24542b0d3b47d591c1b2e2c2854f69e28bd1c81b44bbd4c9557c56cdc737075041c453f79d405b1349afea2c7fb364564985839f508481f77197cb8bea079defd233f0c2f3416447886af32c15a66679d573c3f64193743ca0d36cb033d530e37fe", 0xf0, 0x5}, {&(0x7f0000000200)="6c163e8dfd3a74a18605b8e55c7c9e011a6a94c22e5e2e13c159df89503f52a18b8d5fb39264dd33ed2a0282e63be18ed27a0c16d4522a04504fbfabaaa6d57165605507d7e1296c8a3d8a2122d7ad6ed41942d067232d36c311ad1914e4ccd790af775aada0e01aee87b64f4e48084d0e96b8af1ded3205a7557f870c808efd64ca87f8a2a946ee356d426f25415d12b65e5e035397", 0x96, 0x7}, {&(0x7f00000002c0)="df0af4588299b2f958d547707bae2ddcb62481adb9cc224f62d5bd843b11ebc8a7be4aa2d010ae371a8011d08c31dd2fe70b17aa6953bf366e9afa5e16d30771029ee14c15640739e37117e93ac3c948f66397fa0ab51ef58940dd9e3c18caca7a13789a21fe9773d61477a262cb3975fe883ea2d512165ac914acdd3bb09432", 0x80, 0x20}, {&(0x7f0000000340)="030fa797ed6e448c38811e2decbcd1ca20669fc9e3e64f6fe8048d4f8cbd7ceb5a118083739c8ca42bc89540c7efafd428a4e7c651ae02a4a0079d40c931c9a1091dde2d978fc7ce1ce52ade6a5f7234b48023814517653c0a8a88ffdbe8442d27de76d9fa98c8a7fcc938a33877fe6c3533ccdf23d596ffac5d5666c52ac42495957d65cc48e34e7d5af2897a255efc7e04bee06774eddf72aeaef2cc12a5a0dc90515da570aa29187b182153217826ab221bee9cd37d849a88de82852b1e7341318d37823bd1df0a8e8ad78609c4dc86b7599a0d7747a1137ec62733091594b2fdf91ff1648717106b3e07fd7108", 0xef, 0xffffffff}, {&(0x7f0000000440)="32233c449c0d4da02eac051730b8dc526c0e8ab0fd4b3ec7ed264fb4c621858804be3050ee4622386877a2df2dfc1d933af63b5953c9108a23590a6b3bed71733b97dfd4cdc5292375aeaa9facae2aa1a5ba713102f790f7b5cb77beb6e7cf1a6fa7738a91fdc44f67a1ab26032c5346cadc049415b03b6f31772e3585a43f9e19622a8eaa0f5827d9bf70560045ad446d817799362c4df15a58a62a7ee12caf250e0a6ae428c63f166d8c742fb5bdf52d814467a2e900d8a583e6d1e4b2f138277c459f19f5cbbf14e0905d5dc114db9650e63d86d8c3dc88c0f36e62021bdcd36311238a80619a24f63307c8ea2d6b23c1379249836cea5136390b0bba0c4661b23b4eb5358b89faabbeefbf0b874a3edd8c8f03d37be79a8dc3d81ea2bb7a33b823efb7362fb0dfd761137d0e17e920ffc9e56fe4d0621606b4bbaaf777310bd41839f1c69f2502c5bbd6a5b1ebfab1dd6cf1ea288e3ed053e95a33dfa21faf9df91cf7ebe793075d63642dfa73079b8ed5604662c8e4b6076a8f0c539c3b4b582c9052919b9580b1fba1d111496a67aea2f27d5ae381cbc086c20503ea4d4b0bc140caffce560f39853eba46af49954fec75c9565c7abf3aeed28b95f1c77fb5801f50e61627b71c5de069ad59ee025f207d17176100f3e1c0b333f4c0c139edb7ac674afc58710525c0b646519937c5ec8b49e97ce09fe2d69b7cb5c9a01ad1b304a5ef23487ba394df7cb5e324c27ad38e702e5c36ab15995ac23d8f21d21d5f11bb2246bc1928c44514f081c509be90aaf87c13b56838716f8ac4b02b67e626fcef857882600f25a620320f879c49db15aaf9af7a57bfa89776e4d71e1dee2209fe38c8bdebd56a1a1310310e2e394ef66735b3d4ba56122986b28378c5cbdfc3a6699b305c59e7978b2ae6d73286b18059631bbeee8b1d368f4384840246836fb7a77d592f765f327030a49008bd3cc3385af6842287f73c2589601ff108d97d728da6c31c6b60f2fededbbca4844a96d08b55479fe551e284a94c72502cedcb8d703e3bc06438c1f9e1382e42b087eed8b43c57b1182fa4a1e3f576a74130d1b30f28934d2b57065039aaf6215e3955eda5c8c9cc617579916dee0aa1071aec843bed70173b73f61cd6192672b95be6ea7fffce7c0d96274830cc55281ae11a2a5a1737ab9b3f3959b830d3ec9f79707f5c6fcab99a1b30602c797039d798914b3682a92515af68a2fd2f16fbaa7d26dc7a1f634aaead89bcce8b64c75128052d96e692ac1b698f389e9ca4778fb14fa776ccb1361114918f025bf1ac4abfa347f9891e84aa61c2e77b3d36626f386e9746e54dac19d09311134f542e01d933af1feefde285eb24379990fbaec66820e03a725ccb86fa6c469b1a2715d1149d276b21d6f99a8623f4ce13b321f21f6a2571f10afb46273dc4e42e843904f051eda70b4c903656e9ea512c8bc694b6f9281089e8cd3cfee39b42012aaca27e8a3c04cd7fe52a41de26eb5cf06ac2853103e53be151d8efa6ebdc9852142a65c231e6d771d3a2cd4c6d99c9031b15a62a04a63ab61a8236bcef23594aa59fa31f5fa2a5ea6e4d7a98e544513beb0d6608bfa76d2dbebe7071a6321f02345bbc39492337388b0ff4c2793d94942357fc2082404c4eca1d8bf454e8c9038b9e8ba1d420f92dc15cb735c49e8af83b88606a9cf673e0dd2d41d8a7bf995a24847937a66003d1231633e3a442227d8d7cf7406962f4a854f4af72d7ba1156c78d890f897c6bceb5b21e86972c724dadc7516e00432a106116d01667785216faa462d612a3ca21805b79976d6974374176c829ace42b2dd387737c724a701d94a0112987ced3a5532e2ffdc277ffa5aef7384e15924c6c64370cc687725ead1d588e13a14221fc458999e887230bda039b183e776d3d898903466f2f631071454be65a3a2c3a88e2718887f5991a7aa9def591c5276c714ce3c60c06d44ef34305f9ea43ad18856931b58c48bf5892bb8f42a6b848f1b44621363df24692bcaf0472267a9978f8ea0a57e4ac85bcb5a3050e0afe44ebb2c7dd8c17613d0fc3d0d319aca11ea099f68c95e4d5d6d69504a2ab55b1c5c34d80d09fefb22fa7e9cfb68225d74ff4a0c4be84e710735e89e579dc3186562da2dfca44ae88f21e1e986d6a98678961afbac3d8b891a4afb4853212fa1cf7f1763b51ef8babbcbea2381aaa77489be20db3bfabaa1503461ee3fdc0f263f92b9f2c4e9b7598dd9e1477c39460ba37694507eb5b01959b257f9f3cc2b384934d1c436cc65eccb6a744dff4ed06e583bacdbfe0ec31c05ceed605fb440e6ac31508c4e05524caf6c4c71c2768319692a6519b8ec2edf762c4b9b5c836fdd07f8e6a5d58d8a069e0126cbc2052738c90b9c556136da4d7bb4aadd2552f76cdb550927a21c6460805d0615547246eada32f59004175725bb278fbd136dbd9540e4c5e5866fe3b16f5d90af1c0dbf479e9fe4f5d7493182d46c4cb41cbd60465239ebfbd4fb2d8d0d977ea28711bb1527f83effe97ff084d13ea59a6f9d8068fdb6a3fdcfc9b80782bffd339fe6ab85a20c9148d6e3493cecd3a4b1e305b13d93c4437016232836527590eac6d0c4a6ecfc8e1514bd432a20b2a4cdcc83195a4e547cb5cd801c279e7b120240213d5564eb5ce78bc0434c841ede8baa71d9aeb11b08e55335c5f7c317983761724cbdd3e696936f4de179bc99c72be55767ec4e2ff0b89a8554a60550fe21143dbd840f17bd4f4f74160c474bb1607d45ec9e0ca1943c89d839d07e72d8ff8b8b069a3073d320403a8bcdf238079404ad8ea951a157b3cc74d7b46aaa5bb00cb211f876c93b6900df246fb6f87949a3367943d6a9d447093b1855fc00373cfb3f2519edd1b88ca15345e5e8d8e1aef367b19f53d324bcc8aae61455dd6ba2dbfa579252f7460cc72e071574ec00475e5541c7e1e6e49e52c5ee7c276b70a01a0553263cedd08f5864a42f6c4b13f87899f93a09c71a8ac95f95d25c029c3ba4661991f0694018e35909266289c375236fc30cc48c5f01f6748aff086e42603641e6635cd1e634e01dd7162c2505d80370988c509dd96b7d26a76f43ade133653b531b52d2806f6e4a9eae586d5af1fd4f7606c8d0ebf40bb550e176bb99a0af4da444c9b98d923b5ce44f9f6be328a3dc71a2db80f0213592773b2a3ea9da1a97c6e7d3c6bb10afeb545de0b635b8437c8f29e15d7f10f69ae5c270edb43b5eca6f425f72ff458de388841a96ed5c9ff29bf06ee7096a9905b3c642eeee46114a429bc2596338c42fd0a13be58a8f10899f988728eccc6cbaef7663059b2c551d9cd057d6dcbbd78458c2d8741f8d5d8a5bb56018d9b58a75e1a1b6daed9b0a23af113238c6f3fac9e47700f1ad0bc924df1748a4571fe2ab509bd65fcd535bcef5750955c525f54fa167d2bd203565e78f8a3790520c680844299bcd1fdcb8d8178578deb2fe18b040c821f86badc67e95916fdf884def7a623d197a6f9b132a94eae215b867c44ef1e4f05547342288ec555fd29ee0c7f144a7573793549af09a559972146f6f171c23d4f16a9f2182840517c47f5595f48159beeee759e601009e31ae9cbe851c972d1e225e31714b687be3e3af892dc7b3f706e38678e7a69ccc644217499524d3b5fe4a72f2e3afe3a43d1a1d3fbdabe43b4b97a5973132720661c291fdab912a966edc4f3e62ce51737a3c1dd5f6ffda44d31fa10abc82a4498728a57b08c06bda7aa889d0f2cbc302f466e59faee0de3a447ca478f610c7320e9ea12e3df9b0c577e6a71ba89d86e75bedf417ebe3bbd8c3435d4a3ac90dbc68082faa610c27a064afb59866a202115c93597c5dbe929cdabe240013e01095fabfe87ba6f8a0d4c6ecff930ae62769673127bedc4f4e0a4342b57d8608ec493746178efeaf1770dc5d1fa6c5337cfaf372dd818616866fd1c624cfca749de6e7a833ed9034a2e9b709e0d4995c07c97f2d92a863d5fe1de8a7d30d7f258022357185ead602075362ea1c3a456959685d64634cec1c5ffdf4a8249d9aba97b77af83abd1b0209d4f1814fe903b05c6363d0d3888881539b841307ae08c200a0e67971abc97f83f4dbb07c410d5873132080833e80cc96aeb968eeab1b4567856c579fb9bf7f821a2fdefbc50295b95e5aeb5b1dd91d6013db1302fc29457deebe2899cb9c44a6944cd2d0bac4967e7dd531bdaa1052adee8b524abfcc15c3345a138754463225939e87b9ed34e2f7693a51cfdb16f784873484404b52005b30cf2c571cfe8da710b773782b55058313e989527f8732d8b34dfc29c87edcc8f5c9a660f641c6dea8683d63fb4e60060db66ff623580271bc6426a5040f3e36f9ef378556e755bafe632fdbf5866b7ad004c4525ddc1ab95e9b063eb72aefcee2ea61c3c253f84034ef6f3746101ecfbf8bfa4dd0b1ac6bb8b3d8db35fa045e9e11f09f58a52fbe61bdd24478e9614df49495f29f638d769ae8622953e79a24e75547da2863547294f93c6bd24b0ef994af79875d65a3baddb1c5662cf7849c2b10fcd906aef3b3dee02a5165ba8ac8e81adc0e80cb768979a3fded8d3d78d005968aacc67a7c2d288705233d7b8f28b7ab3fa32635147c7a004300b00dfc14f5f7db7ffdc4c7cd0c6ddbaff8e8e8e7a71eb33442f0aa666a6414bda2e462c1eb2c0923b37baee33d52f384907a80fe15892312beb4d463b9568c4d87db5ef600bdaedb9d1c08d738a953b9bfea36979e3b06e661a635500e3118ad520e72b4b2261c5350fcf39b95bbaaad03eaa7dab255b7f349d8da6811fb142ef1caadf5a757cfd7ee05549622c294bd7481f1ddcdbbb4a8f33e933d971990dfc3ae798373761a70c8a16ad0d974f49c7ecd30f2724bb884b634c352773d1dc9f69cd2c6749cda26a25f6f78ac5f01be69ed43e7fffbe4856188029f37e1f7c85a37bb2baf618c77c8005f6b653a204eeae5b08c009619b93d83012ae69175b04e82d314851f3af952a5b73e9c48fc080345c74a7fe152e9591b24eba81f70c7d93e56c795dfb88ec087a74eb33d34df824962d0972ce9b34416299d7e8f9db340a63dc54829107758f0ea77f2411079726ac2b820528d79f294a0801bcce9af0bb0356756ba9223d4ff4d461781a933f26781869e3b789bda83c5a6d981e5632bd0a3ada458c6be3510b782c04f6f0f7d61c0bbac175de33fe07710fa497798bca2c8ebbcf5311b9058f99190c6e586663f29599847c8685ce36ac97bdfb3abc76e8c23dce40f8ae8be74f841d67453ea155c92426eeaaae85ecb282c853a37a87e3bd1f9f08b4d2a8146745d1a3670b1bb85bfb045642beb4576ea53c7537436751a97d14860322c8205a614130d57fb4d8c77b3fea6985f065084f061af290f87e1e26b6cca59985ccef3dbc260e67253f74ed261de494a471120f2b12ac21cfb29686711c9a02dc043521483b2db3ecfdef56087cc46bc7d6d54783541d0877e8fc8b00bc28b3eca61acfde77cd287f4a7ec8619fed5148f55b7aa3c3f5c2865297cb2976f2c0789770309dd0675ddbccec926c77b7573197470d95c9ce6eadc57c1794af2eb0f48c7bfba5df32782f34a6726c3dba2b1c5b907c2b9644784d8e3db7fa4ab1965508ef085168cb7966f393e8994d75963b31686e355f5761e881b03ea1246d8b03ce4edeac132bec99a4bf99dbe998e8bcdcedd8dedfa0a1f2b4f0925dab63cdd5626406f4863d23177779cd399dd1676efd47ce321ed03e", 0x1000, 0x7}, {&(0x7f0000001440)="8e7ce7f0ce3f2100906437fd1de5ff22be1aaec06e5c38acb2e3d8fa6b06ee9a649a9b2765b12f005a7cd8739fe80daf7333eeb29f39a34016e11d45414ab712eec63bc099d743d45264eb8ffba02f52b9653a609c", 0x55, 0x7}, {&(0x7f00000014c0)="dbc3e98cf6ccbce08e4ef0bb1a58b35c0999c5ab3423116f592a790572c1b7216e2474ed4765d8166b1f9c60f51ad948823f6c4e58fafd8d38c93fd0ee7b86a9121b8e7b091ff1bc0897bed66af166f8216e84075ad2af768826a79b8984a0ced9740530c6a2b35d6d6526572d7ef43b72b37f576b9374ddf276269ff619285f8fedeca29d7855f5f94737450493874d750fe431320381fa22012f42b30bd9b5470e324b5c4ebe826435775c719416056600f490da7a2e6ab822e39b887322579c2699", 0xc3, 0x7ff}, {&(0x7f00000015c0)="c76b3fd4fec149ad4fbb084064dbe97268ac25568725ec3078938d4ff4cf0f23f4efa999852bb33c0253cf8ac6b4c9d4cdd0821246c746c8d88655771cc2d65319a182da", 0x44, 0x101}, {&(0x7f0000001640)="a1fa118bccef3ace2634c7", 0xb, 0x1}], 0x2, &(0x7f0000001b00)={[{@dmode={'dmode', 0x3d, 0x9db6}}, {@utf8='utf8'}, {@hide='hide'}, {@check_relaxed='check=relaxed'}, {@session={'session', 0x3d, 0x13}}, {@block={'block', 0x3d, 0x800}}, {@block={'block', 0x3d, 0x200}}, {@uid={'uid', 0x3d, r0}}], [{@euid_lt={'euid<', r1}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fowner_lt={'fowner<', r2}}, {@uid_gt={'uid>', r3}}, {@obj_role={'obj_role'}}, {@measure='measure'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_gt={'fowner>', r4}}]}) socket$netlink(0x10, 0x3, 0x1e) r5 = syz_open_dev$radio(&(0x7f0000001c80)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_dccp_buf(r5, 0x21, 0xc0, &(0x7f0000001cc0)="c14f9483c8878eb62cb7c48cd945f24455a78a6d8094a8c80d16cc4dcf352c33bc3286bf828da7c05ad271b364377c5cd131aa251682b21f0e34ea180c89e025f28f25f7539e76da5c8212a04e70d52ebbe3688142b8ea439ecae7b5593804cea0f746ea04e38746c4d3556f8936f29bede0d9940b18cb8f437d3ba1558e633f8f22dcd6a7fb76ebf86c5ad46e0e10b5f258e0fed6a6f0ded4f8de948f09c3", 0x9f) 04:31:58 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x2, 0x0, [], {0x0, @bt={0x4, 0x3, 0x1, 0x2, 0x3, 0x1000, 0x7, 0x1200000, 0x6, 0x5, 0x10b2, 0xffff, 0x6, 0x7fff, 0x8, 0x20}}}) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@bcast, @remote, @null, @null, @netrom, @netrom, @rose, @bcast]}, &(0x7f0000000240)=0x48) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000180)) 04:31:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r4) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x194) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x7, 0x6688) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$unix(0x1, 0x405, 0x0) 04:31:59 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) move_pages(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffc000/0x3000)=nil], 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) socket$netlink(0x10, 0x3, 0x10010000000016) 04:31:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(0x0, 0x4, 0x105000) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0xc001}, 0x0) getpid() syz_open_dev$audion(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0xb001, &(0x7f0000000440), 0x0, 0x0, [0x9c00, 0x2ca13d]}}, 0xfef5) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NETID(r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000006c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r3, 0x0, 0x2d, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r4, 0x4054561e, &(0x7f0000000040)={0x3, "04ac4110642dcb1863956c00c27054a15cf83f91fa6e12e287db95bbd8f95bbc", 0x2, 0x1c36, 0x2, 0xffff, 0x5, 0x3, 0x40, 0xfffffffffffffffd}) socket$netlink(0x10, 0x3, 0x8) 04:31:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000080)={0xf6db}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x3, &(0x7f0000000000)='t)\x00', 0xffffffffffffffff}, 0x30) r7 = getpgid(0xffffffffffffffff) perf_event_open(0x0, r7, 0xb, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:31:59 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = dup(0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0xff, 0xd4, 0x5}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:31:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:31:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:00 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1485.649381][ T26] kauditd_printk_skb: 92 callbacks suppressed [ 1485.649395][ T26] audit: type=1400 audit(1555821120.143:22662): avc: denied { map } for pid=4828 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0x9, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x280, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x400000000000001) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000080)=""/3) r7 = shmget$private(0x0, 0x3000, 0x8000000041, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r7, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) r8 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000100)) r9 = getpgrp(0xffffffffffffffff) perf_event_open(0x0, r9, 0x0, r5, 0xb) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1485.683279][ T26] audit: type=1400 audit(1555821120.143:22663): avc: denied { map } for pid=4829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1485.777578][ T26] audit: type=1400 audit(1555821120.273:22664): avc: denied { map } for pid=4834 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1485.876018][ T26] audit: type=1400 audit(1555821120.303:22665): avc: denied { map } for pid=4838 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1485.986983][ T26] audit: type=1400 audit(1555821120.303:22666): avc: denied { create } for pid=4796 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1486.131316][ T26] audit: type=1400 audit(1555821120.333:22667): avc: denied { map } for pid=4839 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1486.284691][ T26] audit: type=1400 audit(1555821120.463:22668): avc: denied { map } for pid=4851 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1486.341534][ T26] audit: type=1400 audit(1555821120.823:22670): avc: denied { map } for pid=4853 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1486.368297][ T26] audit: type=1400 audit(1555821120.823:22669): avc: denied { map } for pid=4854 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1486.437591][ T26] audit: type=1400 audit(1555821120.933:22671): avc: denied { map } for pid=4856 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:01 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x880d08af44eb2805}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x8, 0xb, 0x1, 0xffffffffffffff9c}) sendfile(r0, r1, &(0x7f0000000100), 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x800, 0x15) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f00000001c0)}, 0x10) r3 = creat(&(0x7f0000000000)='./file0\x00', 0xa2) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000140)) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) socket$netlink(0x10, 0x3, 0x0) 04:32:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:01 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101800, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:01 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x100, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x1ffffffe) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80006, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x1) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x1) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x0, 0x3, &(0x7f0000000100)='./\x00'}, 0x30) perf_event_open(0x0, r6, 0x0, r0, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:01 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0x0, 0x3, 0x1, 0x3}, 0x1, 0x100000000}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) semctl$GETNCNT(0x0, 0x400000000, 0xe, 0x0) 04:32:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000100)='./file0\x00', 0x41, 0x89) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:02 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='pid\x05\x00\x00\x00\x00\x00\x00\x00\x04', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(r4, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x7000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xf4) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:03 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:03 executing program 3: semop(0x0, &(0x7f0000000140)=[{0x0, 0x8001, 0xffffffffffffeffe}], 0x35) r0 = semget(0x2, 0x2, 0x2c0) semop(r0, &(0x7f0000000040)=[{0x3, 0x7, 0x1000}], 0x1) semget$private(0x0, 0x3, 0x331) r1 = semget$private(0x0, 0x3, 0x1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f00000000c0)={0xfffffffffffffffc, "f248dfe9af3370c5e3c0a9201d2c29d99a6ffc5a30641916998deee1490ef23e", 0xa80, 0x90d7, 0x8, 0x1, 0x4}) semctl$GETNCNT(r1, 0x0, 0xe, 0x0) 04:32:03 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:03 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:03 executing program 3: r0 = semget(0x0, 0x0, 0xa8) semop(r0, &(0x7f0000000040)=[{0x1, 0x5, 0x1000}, {0x2, 0x3, 0x1000}, {0x5, 0x9, 0x800}, {0x0, 0xc2e, 0x1800}, {0x3, 0x9, 0xfffffffffffffffe}, {0x4, 0x1, 0x1000}, {0x0, 0x0, 0x800}, {0x3, 0x6}, {0x0, 0x3, 0x800}, {0x3, 0xf82b}], 0x2aaaab70) r1 = socket$xdp(0x2c, 0x3, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x20, 0x4, 0x4, "4c16894041ec7337265cc4b05d6f3fad", "56d4b8132bc3197680ef24"}, 0x20, 0x2) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x4dd600ae) 04:32:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:03 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget(0x0, 0x0, 0x80) r0 = semget$private(0x0, 0x2, 0x0) semctl$GETNCNT(r0, 0x10000002, 0xe, 0x0) 04:32:03 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:03 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x1000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) r7 = ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x118) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(0x0, r8, 0xfffffffffffffffc, r0, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:03 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:03 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:04 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x5, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:04 executing program 3: semget(0x3, 0x2, 0x101) r0 = semget$private(0x0, 0x0, 0x100) semop(r0, &(0x7f0000000000)=[{0x2, 0x208001}], 0x1) semctl$GETNCNT(0x0, 0x1, 0xe, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000500)={0x1, 0x3d7e}) r2 = getuid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x58, 0x3, {"590c25c65a0ed041143054fa3f27867b4765344e6389af8d589d910113284da68e9a59a7e66ea05bbeafda67525a7f88f23f50608042103957c45b8e3f"}}, {0x0, "fa686dda9aa7f480d0e6da6ebe7e17d112ddcb63ff412b2955239396da84e9b78b"}}, &(0x7f00000003c0)=""/250, 0x7b, 0xfa}, 0x20) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) write$FUSE_ENTRY(r1, &(0x7f0000000280)={0x90, 0x0, 0x2, {0x3, 0x2, 0x9, 0x100000001, 0x20, 0x7f, {0x5, 0x3a5, 0xfffffffffffffffd, 0x5, 0x41c0, 0xd5, 0x5, 0x7fff, 0x9, 0x100000000, 0x80, r2, r3, 0x400, 0x4}}}, 0x90) r4 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x480000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000100)={0xbfa3, 0x2, 0x5, 0x7ff, &(0x7f0000000080)=[{}, {}]}) 04:32:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:04 executing program 1: dup(0xffffffffffffff9c) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x2000) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x200001) openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:05 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:05 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000200)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1490.679681][ T26] kauditd_printk_skb: 62 callbacks suppressed [ 1490.679696][ T26] audit: type=1400 audit(1555821125.173:22734): avc: denied { map } for pid=5074 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:05 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1490.745549][ T26] audit: type=1400 audit(1555821125.183:22735): avc: denied { map } for pid=5070 comm="syz-executor.3" path="/dev/radio4" dev="devtmpfs" ino=1482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:v4l_device_t:s0 tclass=chr_file permissive=0 [ 1490.790036][ T26] audit: type=1400 audit(1555821125.213:22736): avc: denied { map } for pid=5078 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1490.824771][ T26] audit: type=1400 audit(1555821125.313:22737): avc: denied { map } for pid=5085 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1490.854572][ T26] audit: type=1400 audit(1555821125.343:22738): avc: denied { map } for pid=5086 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1491.069282][ T26] audit: type=1400 audit(1555821125.563:22739): avc: denied { map } for pid=5090 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x3ff) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1491.170862][ T26] audit: type=1400 audit(1555821125.603:22740): avc: denied { map } for pid=5091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:05 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1491.294605][ T26] audit: type=1400 audit(1555821125.623:22741): avc: denied { map } for pid=5095 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1491.334296][ T26] audit: type=1400 audit(1555821125.723:22742): avc: denied { map } for pid=5098 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1491.357495][ T26] audit: type=1400 audit(1555821125.753:22743): avc: denied { map } for pid=5100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:06 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:06 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x84000, 0x0) write$9p(r0, &(0x7f0000000080)="174d9bf32af52000591bd24636fa96da262795fe7b252d671db3bd50ff53db1a833112c35b97ef90ca7502bfc7797677b295b34e5c9d3954f85190ffa5ec251f7c", 0x41) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:06 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:07 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:07 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r7 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r7, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:07 executing program 3: semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:07 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x14, 0x11, 0x1, {0x10, 0x0, 0x4}}, 0x14) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) r6 = msgget(0x1, 0x100) msgctl$IPC_RMID(r6, 0x0) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:07 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) 04:32:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:08 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x500, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:08 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:08 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:08 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) socket$tipc(0x1e, 0x5, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x22002, 0x4) 04:32:08 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x6000) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:08 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:32:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:08 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) 04:32:08 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x7, 0x80005, 0x9) r2 = creat(0x0, 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x3) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0xf76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1000000) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80000000000007fb, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000080)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) r6 = gettid() perf_event_open(0x0, r6, 0x0, r0, 0x8000000001) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:09 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x5, 0x0, 0x0, {0x4, 0x1000000}, [@nested={0x2c, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff9effffff, 0x300}}]}]}, 0x2c}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) 04:32:09 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:09 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000080)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000100), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000280)={0x90, 0xfffffffffffffffe, 0xfffffffffffffff9, {0x1, 0x2, 0x5, 0x7fff, 0x3, 0xfffffffffffffffd, {0x4, 0x2, 0x0, 0x6, 0x2, 0xff, 0x8001, 0x47, 0x4, 0x1aa, 0x9, r7, r8, 0x200, 0x9}}}, 0x90) 04:32:09 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) syz_open_pts(r0, 0x400000) 04:32:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffb000/0x2000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:32:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1495.846391][ T26] kauditd_printk_skb: 77 callbacks suppressed [ 1495.846405][ T26] audit: type=1400 audit(1555821130.333:22821): avc: denied { map } for pid=5346 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:10 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1496.004972][ T26] audit: type=1400 audit(1555821130.493:22822): avc: denied { map } for pid=5349 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1496.035317][ T26] audit: type=1400 audit(1555821130.493:22823): avc: denied { map } for pid=5348 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:10 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0x101, 0xffffffffffffffff, 0x0, 0x1, 0x6, 0xcf, 0x8, 0x0, 0x8, 0x2}, 0x10) 04:32:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1496.151311][ T26] audit: type=1400 audit(1555821130.643:22824): avc: denied { map } for pid=5356 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:10 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r5, 0x0, 0x62, 0x200007fd, 0x0, 0xffffffffffffffe9) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r5 = dup(r4) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000000700)={@dev, @remote}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r7 = shmget$private(0x0, 0x4000, 0x5, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r7, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) [ 1496.257152][ T26] audit: type=1400 audit(1555821130.643:22825): avc: denied { map } for pid=5357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:10 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1496.321015][ T26] audit: type=1400 audit(1555821130.703:22826): avc: denied { map } for pid=5358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1496.345041][ T26] audit: type=1400 audit(1555821130.713:22827): avc: denied { map } for pid=5364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1496.428011][ T26] audit: type=1400 audit(1555821130.713:22828): avc: denied { map } for pid=5365 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1496.460774][ T26] audit: type=1400 audit(1555821130.793:22829): avc: denied { map } for pid=5369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1496.527265][ T26] audit: type=1400 audit(1555821131.023:22830): avc: denied { map } for pid=5378 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x314) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:11 executing program 3: semop(0x0, &(0x7f0000000000), 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="8600000049871cc800713376ebecfa87acd8c64618b2e304d8b9aac0ffb211e05057ef0389a6934c85284298b517af98b6357876f4b9508ae92a4a4d1cf422e6cd6c942c86d9d3486f8dfaf764f83c83a8f46f486c045cbeab2706a133eb8ca0c47aa833979b436fa45a4fb019fd00eafadd9fc2d48e6406085bcadec22f86343121f3aeda44c29544dbfa53cd6968b6f6691434a24304093710c114d429b1646d3e03490cedee634f8f68dca156b25953cf1d3ec9138b66c5eb4947ba60970e483ea91e9db4a217bb13a9e3d4042dc5c1f686953fea5eff6ff9c7b258fba75a73"], &(0x7f00000000c0)=0x8e) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r1, 0x3, 0x504}, &(0x7f0000000140)=0xc) 04:32:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:11 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0x15, 0x7fffe, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xddf) mkdir(0xffffffffffffffff, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:11 executing program 3: r0 = semget$private(0x0, 0x1, 0x4) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001, 0x1800}], 0x1) r1 = dup(0xffffffffffffffff) bind$isdn(r1, &(0x7f0000000100)={0x22, 0x100000000, 0x2, 0x40, 0x7fffffff}, 0x6) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:11 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = semget$private(0x0, 0x3, 0x400) semop(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x1000}, {0x7, 0xff, 0x800}, {0x6, 0x0, 0x800}], 0x3) 04:32:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000080)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:12 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:12 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0xdd) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:32:12 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 3: semop(0x0, &(0x7f0000000000), 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x33b, 0xc000000000, 0x7e6, 0x8, 0x1c49, @local}, 0x10) 04:32:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r7, 0x1, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004090}, 0x50) open(&(0x7f0000000040)='./file0\x00', 0x2341, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:13 executing program 3: r0 = semget(0x0, 0x2, 0x8) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000080)=""/196) semop(r0, &(0x7f0000000540)=[{0x200000007, 0x8001, 0xfffffffffffffffd}], 0x2aaaaaaaaaaaac97) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0xed, 0x4, &(0x7f0000000440)=[{&(0x7f0000002080)="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", 0x1000, 0x9}, {&(0x7f0000000200)="530102713a50e016fac1c2d6d7a0dbf590838d05c7527d97901e4c27922375c430c0027e5fa7a843f1f48a52764469e3b2dced4f23b5cd7f7aec39df39e3b6d3b93f08c24bc0f5a3adbce924801aa142cc9cc26a89c3c5a83d04e7d7c107932ef471d87bd2a05c2de7e4a495588808696b88109d5cbe5c57ab0618a45fc27e6afb7951d338c8251c29f36a26ad997822736262e1b5afed35036379faa756c7e1516972d1220c6fb9d66aeb2b9235cf12203a0967822d83fc331ed8aba89b4a5cf08820103065536d65ea814f09877742fcc7d768a417c3d91d9a6dfb56c27fe8d18d44d6e0ed229060", 0xe9, 0x7ff}, {&(0x7f0000000300)="95c004a907c9ce380bba3313b69889a78e9753557f9bb82c93be807d3770a177a2c9fbb6c76a60045412cb11ba4624e99a70507496d3729fbfa0b4c797ec15e0c98219adcd851da2e6c4d08e15e05d9716f3e675798e7c72fb32dffc57f41b38c48a144efb1951d7b7acadd221d14fff328f80cc9ce4e77d33fd9c19894100be51ba46def163ff4887dd1577ed6047b1a03c4598462747ad23b013ae087bd263f3e3c0427c1dc1330229d7f57807d1587c3c5c12e36ecb0d16beb6ffb1d51d35efc3337775898edbafc2b227a4cf3824eba107f95e7120f4dfe92682ae6116fcfcd16e33f7382f98d023501c0e435a66ddce9b22323dbf10bb", 0xf9}, {&(0x7f0000000400)="cad208c7ca2974238712c0f895ffcc39bea0345604086ad3b4591ae54b80c91fb454e182adbdf559f5e95dcb3740957245f9e5ea73814546969c0d", 0x3b, 0x200}], 0x1000000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x80000, 0x0) write$P9_RCLUNK(r1, &(0x7f00000004c0)={0x7, 0x79, 0x2}, 0x7) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000001080)=""/4096, 0xd29) [ 1499.080099][ T5515] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=a904c095) 04:32:13 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x200) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000080)) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:13 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget$private(0x0, 0x2, 0x0) semget$private(0x0, 0x4, 0x100) semget(0x2, 0x5, 0x1) r0 = semget$private(0x0, 0x2, 0x100) semctl$GETNCNT(r0, 0x1, 0xe, 0x0) 04:32:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ff7000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:14 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) setsockopt$inet_int(r0, 0x0, 0x13, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='pis\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0xa000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x4000)=nil, 0x2000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) r7 = ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) ioctl$KVM_CREATE_DEVICE(r7, 0xc00caee0, &(0x7f0000000080)={0x2, r1, 0x1}) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:14 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) getpeername$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080), 0x430b508) r1 = socket(0xa, 0x803, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x709281, 0x0) unshare(0xc000003) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1500.871025][ T26] kauditd_printk_skb: 75 callbacks suppressed [ 1500.871039][ T26] audit: type=1400 audit(1555821135.363:22906): avc: denied { map } for pid=5613 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1500.943518][ T26] audit: type=1400 audit(1555821135.363:22907): avc: denied { map } for pid=5614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1501.005409][ T26] audit: type=1400 audit(1555821135.493:22908): avc: denied { map } for pid=5620 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:15 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1501.161925][ T26] audit: type=1400 audit(1555821135.653:22909): avc: denied { map } for pid=5624 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1501.233278][ T26] audit: type=1400 audit(1555821135.693:22910): avc: denied { map } for pid=5625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1501.403972][ T26] audit: type=1400 audit(1555821135.893:22911): avc: denied { map } for pid=5636 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:15 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', '^/[\\\x00'}, 0xa) 04:32:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1501.551823][ T26] audit: type=1400 audit(1555821136.043:22912): avc: denied { map } for pid=5640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1501.666131][ T26] audit: type=1400 audit(1555821136.043:22913): avc: denied { map } for pid=5645 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1501.773195][ T26] audit: type=1400 audit(1555821136.073:22914): avc: denied { map } for pid=5644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1501.869279][ T26] audit: type=1400 audit(1555821136.073:22915): avc: denied { map } for pid=5643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:16 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffffffff62d5, 0x240000) open(&(0x7f0000000240)='./file0\x00', 0x20000, 0x1) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket(0xa, 0x80002, 0x100) r3 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r3, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/3) r6 = shmget$private(0x0, 0x4000, 0x5400018e, &(0x7f0000ffb000/0x4000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r3, 0x5600, 0x0) ioctl$TIOCGPTPEER(r4, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) io_setup(0xfe, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:17 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0xfff, 0x4) 04:32:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x11, 0x80006, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(r2, 0x4000000200000) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x600, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:17 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r4) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:18 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x240400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r1, 0x400, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) getuid() 04:32:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) sendmsg$alg(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7", 0x1}], 0x1}, 0x0) write$P9_RATTACH(r1, 0x0, 0x0) 04:32:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:18 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 04:32:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) r6 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r6, 0x80046402, &(0x7f0000000080)=0x6) 04:32:18 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:18 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 04:32:18 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 04:32:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:19 executing program 3: semop(0x0, &(0x7f0000000040)=[{0x0, 0x8001}], 0x2aaaaaaaaaaaaab4) r0 = syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x1, 0x40000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000009c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f0000000980)={&(0x7f0000000680)={0x2e0, r1, 0x1, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xe}, 0x7f}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3f, @remote, 0x6}}}}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}]}, @TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbd}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x951}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xed37814}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa44}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbc5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x90}, 0x4040804) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'lapb0\x00', @ifru_names='gretap0\x00'}}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) r4 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr=0xfffffffffffffff8, 0x4e24, 0x9c5, 0x4e22, 0x2, 0xa, 0xa0, 0x20, 0x2d, r3, r4}, {0x80, 0x8, 0x2, 0xfffffffffffffff7, 0x1000, 0x75, 0x7ff, 0x7}, {0x1ff, 0x6, 0x5cd8, 0x1}, 0x9, 0x6e6bb2, 0x2, 0x1, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3f}, 0xa, @in=@broadcast, 0x3505, 0x3, 0x3, 0x3739, 0x9, 0x0, 0x1}}, 0xe8) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000140)=0x5, &(0x7f0000000180)=0x2) clone(0x0, &(0x7f00000001c0)="90bd0c91bd8053ae0f0fd208b27041ed4c6dbbd3fcb68c9b6ed70b8b36a1aec545d849cd4ea2c209", &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="98ba6af656c25a01be26e278ba00657988bcad382640889bdf4b7dda256ff2940666cf67205746accad7a625fc30e1565ce02fa934355c7e299da59669605c426afb685c811d97c2b735d453a37755ba3f594e7d2cc16b37bf72f21155bee8c8ffc0f0ac545ad8990a85b80354d9f24a2835f1b816d6a7ae8986b5b604b26b4e0f59ac2f3f5b5fc8ba4ea44a32e38fb791da722ac0ad5c0bb28fb39e3e7d110e97ccaa9cf98992c2a458b7f8a9425d03bd8b7dad816a64930dab37a9f4e3bc8d9baecdb05369340e7158ff6d9a8f1493421c") 04:32:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) r6 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r6, 0x9, 0xffffffffffffffff, 0x4200001) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:19 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) poll(&(0x7f0000000140)=[{}], 0x1, 0x0) 04:32:19 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xc80, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000080)={"14bb7eaabe0d59eb765a9e5846dcf0df3a8adaf32b5f6d7ad582e50be38a801cb2769b27fc1a8df3a2ef8c47857bef6c47c153dc5503b11983c375e98f537d15ec1d123deceb6c57f384489573649a6129c61b29c5ada4f10e4e399cbcdb7386e38210865a1b1b5b8e142bb45a4476b63fddd647c73549444f1e28497aea7ee635354f12e4c558c976ed83dde75cc7c4b97ea4fe9573dabac94dcf7dffa882f5e38c4d520d80b910fd64c180d842eb4851ee60cfe2d66c4809725da93e66d6abe2a1b687ebac5819cbb903659f965fbaf1ff68c321075a4c3a5c6e57f3cd19806dacbc4b95b4660be03808b2eff6a51f661edf18e03b632b6207d840f8c5c1b0f7404d44749903053a37f961f8423d52594c2d120d76242b98b59d4a0db0b6e86f396507d9b03bf86a248f7cc4c21e81067c8c716799a6b2b181e2ca00c49e7266dfc86fac743512ef5c29f343cca4943bdfe376547b5d096acf1da31bee0c178fe54785b383f58b284c8070b2a47e78c90b118f84392ac9cbc2e8a1396b597abf5154df6215b4eaa8b004f9baf71679df6e7b8b19760c84aab9eb1ad372d9cf31d0a10324ef5e3ab6ce9677631cffa9945c4db7018496a67634bd9a6cfc15ee3d782e76fb2f9cce2f9f7daceaaab673cefcc63d654322355220d1b720aec5586fa1457d74827a23b8ab878d01ebfbef9f66758dead835deeaccafd29c014636e2c4b5569dca6b7972f119781461d9bcbac54376545c7674bc061fa675c75a9dcc683da2fa4a2185247be6990c98c23f6986edf73970a16693b31fcc54d9007a3e3eebed7a8bc6eb694ad3fec76660cea6ef2a6cc9f9a5760b91df2c6a279cb950ba89a184ae67d4640827647f0cce46a26ad872e421fdca0d0d5764fb32c130ee65330da9122cccb9580a6e1c29d8a03c122daae3132e38ad1e99934d380d0397f2ac677786ceff08f34f5f7e6ed403964cf967b0c8e06c88ef6b5253d7a3e32ba5e2a7d31de025bba1e917dee2b354cc14bff5ab4574ebed58e9f8966891eca91e0faa03bd0c9922d5fdb814e7737fd713a0daf14e3d44708829863684e0df7cedb9820ea3e83243ab4d8814884a98254293982c091275ebcf9a57dfea0dbb5e714c2f23ad76422ec06bbf3dd5824b9c342c5faa54975ce293d3d966261930ec25d283aca07c829f9b650fc2faf967991e57cc29ddb629f2428acbc38917570ef4349e06cdfedfad04f2d76ea879f6057dcc9717a8d900890252341436f43e800771b1231f1967ef9d8a1c261ab4c7ad7bd79ba750c5de4e9b220b32bb9b3e800582da1f19261e94d711dd60f2cc49e27a6901e3d58f38ce25966b4d8a8564e8ded1adeba65409b809601df7d14f6def3d3567e0fee7abe8a4422283385d72a621f3210a602f1c9cf151a4f0ade1705b24aa28210f41b7530ef0d12bedb7a4"}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000480)={0x0, 0x8}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000500)={r1, 0x9, 0xffffffff, 0x1, 0x80000001}, &(0x7f0000000540)=0x14) accept(r0, 0x0, &(0x7f0000000580)) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x35) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) 04:32:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:19 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:19 executing program 3: semop(0x0, &(0x7f00000000c0)=[{0x1, 0x10000, 0x593f10e62c87bf3d}, {0x0, 0x1000, 0x1000}, {0x3, 0xfffffffffffffffe, 0x1000}, {0x3, 0x5, 0x800}, {0x7, 0x30c, 0x1000}], 0xa4) r0 = dup(0xffffffffffffffff) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x2000}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:19 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget$private(0x0, 0x2, 0x18) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x800}, {0x7, 0x1, 0x1000}, {0x1, 0x7b3, 0x1800}, {0x1, 0x8, 0x1000}, {0x2, 0x8, 0x1000}, {0x1, 0x6, 0x800}], 0x6) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x6}, @sack_perm, @mss={0x2, 0x1f}, @window={0x3, 0x7fffffff, 0x6}, @timestamp, @mss={0x2, 0x4}], 0xcf) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:32:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1506.040482][ T26] kauditd_printk_skb: 58 callbacks suppressed [ 1506.040497][ T26] audit: type=1400 audit(1555821140.523:22974): avc: denied { map } for pid=5864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1506.154542][ T26] audit: type=1400 audit(1555821140.643:22975): avc: denied { map } for pid=5865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1506.215289][ T26] audit: type=1400 audit(1555821140.703:22976): avc: denied { map } for pid=5866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1506.238677][ T26] audit: type=1400 audit(1555821140.713:22977): avc: denied { map } for pid=5867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1506.420222][ T26] audit: type=1400 audit(1555821140.913:22978): avc: denied { map } for pid=5870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:22 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) 04:32:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:22 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:22 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@timestamp, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @sack_perm, @timestamp, @timestamp], 0x9) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:22 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget$private(0x0, 0x2, 0x200) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) [ 1508.019497][ T26] audit: type=1400 audit(1555821142.513:22979): avc: denied { map } for pid=5874 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc281}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:32:22 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1508.201391][ T26] audit: type=1400 audit(1555821142.693:22980): avc: denied { map } for pid=5890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) r5 = shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) shmat(r5, &(0x7f0000ffc000/0x2000)=nil, 0x6000) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:22 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) [ 1508.322186][ T26] audit: type=1400 audit(1555821142.783:22981): avc: denied { map } for pid=5896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:22 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1508.458985][ T26] audit: type=1400 audit(1555821142.813:22982): avc: denied { map } for pid=5897 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:23 executing program 1: mknod(&(0x7f0000000240)='./bus\x00', 0x8, 0x0) execve(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 04:32:23 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1508.596529][ T26] audit: type=1400 audit(1555821142.923:22983): avc: denied { map } for pid=5902 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, 0x0, 0x0) 04:32:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:23 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:23 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:23 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1000, 0x2000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000000c0)=0xe0) r1 = semget(0x2, 0x3, 0x460) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) capset(&(0x7f0000000140)={0x399f1736, r2}, &(0x7f0000000180)={0x4, 0x400, 0x1600000000000000, 0x9, 0x3, 0x1}) semctl$GETNCNT(r1, 0xfffffffffffffffd, 0xe, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) 04:32:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, 0x0, 0x0) [ 1508.806060][ T5925] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) [ 1508.828532][ T5925] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 04:32:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:23 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1509.060377][ T5941] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 04:32:25 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:25 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = semget$private(0x0, 0xf97a8d50f37b9e87, 0x4) semop(r0, &(0x7f0000000040)=[{0x7, 0xffff, 0x1000}, {0x5, 0x400, 0x1000}, {0x1, 0x7d7658c}, {0x6, 0x2}], 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:25 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, 0x0, 0x0) 04:32:25 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:25 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1511.492234][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 1511.492249][ T26] audit: type=1400 audit(1555821145.983:23001): avc: denied { map } for pid=5964 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:26 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, 0x0, 0x0) [ 1511.558259][ T5966] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 04:32:26 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1511.697765][ T26] audit: type=1400 audit(1555821146.193:23002): avc: denied { map } for pid=5977 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1511.722562][ T5981] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 04:32:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) [ 1511.764879][ T26] audit: type=1400 audit(1555821146.223:23003): avc: denied { map } for pid=5976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:26 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1511.812550][ T26] audit: type=1400 audit(1555821146.253:23004): avc: denied { map } for pid=5983 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1511.872027][ T26] audit: type=1400 audit(1555821146.293:23005): avc: denied { map } for pid=5982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1511.904036][ T5989] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) [ 1511.955936][ T26] audit: type=1400 audit(1555821146.443:23006): avc: denied { map } for pid=5991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1511.993814][ T26] audit: type=1400 audit(1555821146.483:23007): avc: denied { map } for pid=5992 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1512.056056][ T26] audit: type=1400 audit(1555821146.543:23008): avc: denied { map } for pid=5994 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1512.157408][ T26] audit: type=1400 audit(1555821146.583:23009): avc: denied { map } for pid=5993 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1512.183436][ T26] audit: type=1400 audit(1555821146.673:23010): avc: denied { map } for pid=5997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:29 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:29 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:29 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:29 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = request_key(0x0, &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, r3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:29 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:29 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="67a9a37ac258555baa02e3b1a9d84eae6ad6ec20ab75386630e81510c8f41cf3d5193a2271f4ddfaeb6b1302c42d2b84ef92c99d79b3230f649aa09ec536534d8cc9069574b5842e350acbba7d8552fd288606b23a2c5219faba5c08e9a1eb45f55c8d8a0ae109eb3b6ac451f3bb95e56cc386c5a291f2f876c2c91ebf2eeb95385b956c6f698122bb0bf7864923fbe4606c6d153ad51170d9a429c704115381ae7f8d07a0b7c818e13cc649ff0ebab8b9a03268d4f85686d7caed329a7c79c6b4df43ca84879fec0927f2862ae12eff5e426097a7bca2bef636942ef93066268e5ee093883a8b7f4e714767", 0xec, 0xfffffffffffffff9) keyctl$setperm(0x5, r0, 0x801) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) fadvise64(r1, 0x0, 0x4, 0x5) personality(0x400000a) 04:32:29 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:29 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:29 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:29 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:32 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:32 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:32 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x301000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080)={0x3, 0x7ff, 0x63, 0x6}, 0x6) semctl$GETNCNT(0x0, 0xffffffffffffffff, 0xe, 0x0) 04:32:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:32 executing program 4: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:32 executing program 4: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1517.850951][ T26] kauditd_printk_skb: 16 callbacks suppressed [ 1517.850965][ T26] audit: type=1400 audit(1555821152.343:23027): avc: denied { map } for pid=6063 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1517.932629][ T26] audit: type=1400 audit(1555821152.353:23028): avc: denied { map } for pid=6064 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1517.965257][ T26] audit: type=1400 audit(1555821152.403:23029): avc: denied { map } for pid=6061 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.023426][ T26] audit: type=1400 audit(1555821152.513:23030): avc: denied { map } for pid=6072 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:32 executing program 4: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1518.170919][ T26] audit: type=1400 audit(1555821152.613:23031): avc: denied { map } for pid=6074 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.205745][ T26] audit: type=1400 audit(1555821152.613:23032): avc: denied { map } for pid=6073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.328520][ T26] audit: type=1400 audit(1555821152.663:23033): avc: denied { map } for pid=6079 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.378005][ T26] audit: type=1400 audit(1555821152.753:23034): avc: denied { map } for pid=6083 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.409823][ T26] audit: type=1400 audit(1555821152.753:23035): avc: denied { map } for pid=6081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1518.440018][ T26] audit: type=1400 audit(1555821152.853:23036): avc: denied { map } for pid=6086 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:35 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:35 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:35 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:35 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:35 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:35 executing program 3: r0 = semget(0x2, 0x3, 0x1) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) semop(r0, &(0x7f0000000140)=[{0x3, 0x9}, {0x3, 0x0, 0x800}], 0x2) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x5}, 0xf) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x7f, 0x4, 0x4}) 04:32:35 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:35 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:35 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:35 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:35 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:35 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:36 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:36 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:36 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:36 executing program 3: r0 = semget(0x1, 0x4, 0x492) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x9}}, 0x10) 04:32:38 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:38 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:38 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:38 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x10, 0xe, 0x0) r0 = semget$private(0x0, 0x1, 0x100) semop(r0, &(0x7f0000000100)=[{0x7, 0x5, 0x1800}], 0x1) r1 = semget$private(0x0, 0x2, 0x4) semop(r1, &(0x7f0000000040)=[{0x0, 0x1, 0x1800}, {0x2, 0x9, 0x1000}, {0x0, 0x10001, 0x1800}, {0x7, 0x8, 0x800}, {0x3, 0x2, 0x800}, {0x7, 0x40, 0x1000}], 0x6) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_netdev_private(r2, 0x89fd, &(0x7f0000000080)="289f4ccc37fbf811801ce98309fd66003a14f49271bcca64dd05b78d36aedfb1c7abd50a1b402c3f57cd260115937fc9e0ddc7a4b2d765575b26e01caee8ad14c8c975") 04:32:38 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1524.367825][ T26] kauditd_printk_skb: 28 callbacks suppressed [ 1524.367838][ T26] audit: type=1400 audit(1555821158.863:23065): avc: denied { map } for pid=6170 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:38 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:39 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) [ 1524.582977][ T26] audit: type=1400 audit(1555821159.073:23067): avc: denied { map } for pid=6185 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1524.624088][ T26] audit: type=1400 audit(1555821159.073:23066): avc: denied { map } for pid=6186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1524.653487][ T26] audit: type=1400 audit(1555821159.133:23068): avc: denied { map } for pid=6189 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) [ 1524.707789][ T26] audit: type=1400 audit(1555821159.193:23069): avc: denied { map } for pid=6190 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) [ 1524.792201][ T26] audit: type=1400 audit(1555821159.273:23070): avc: denied { map } for pid=6193 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1524.865159][ T26] audit: type=1400 audit(1555821159.353:23071): avc: denied { map } for pid=6199 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1524.970423][ T26] audit: type=1400 audit(1555821159.463:23072): avc: denied { map } for pid=6201 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1524.994678][ T26] audit: type=1400 audit(1555821159.463:23073): avc: denied { map } for pid=6200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1525.120553][ T26] audit: type=1400 audit(1555821159.613:23074): avc: denied { map } for pid=6204 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:41 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:41 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:41 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:41 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:41 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:41 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x2aaaaaaaaaaaacca) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:41 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:42 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x181003, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0x9, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:42 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:42 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:42 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:42 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:42 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:42 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:42 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:42 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:42 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:42 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:42 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:42 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000001a00)={0x7, 0x8001}) r1 = open$dir(&(0x7f0000001980)='./file0\x00', 0x2aa00, 0x2) fdatasync(r1) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r2 = msgget$private(0x0, 0x1) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000001740)=""/89) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x8001, 0x9, &(0x7f0000001640)=[{&(0x7f00000000c0)="fb6b107f6b47dc7699d56108d5fa8cff40adba3a6675d37c676739398dc0b66526f264f3d8594b1ac437751eabcdb6a7b1d441e209bf525ae16a920bd7e427ed78390a59ed09fc00ecfdb1c21b7281fdc5ffa8b5793bbf3b1bd2ba5ac95a697e0b6e212238e4903f24becebecb6eb5d8b4b29e3dc70c947cbb8e058b52463fc98046a1c5c77f1cb4", 0x88, 0x10001}, {&(0x7f0000000180)="937f9ef840913136493597eab95f6ef9e3b5a39b0377a35f47afe8e1de614d65d88b8a08068c2694d8a82b225f3c4248e4215bf1f5d186578f2d668a28bda35511a19c3081e2cef77c1c92d3971876944ad5464ff8068a40e8e430396b82fb1d5d47de41ebec100288e471491c5848ee7230507743c32a145fc5dda2bc331844a1fba0b2a1eef7cd1bbced9db595ac1c6842be759b64fa3a456ee8a3b0a5f45d5d3aa996126c746d861c98c3e46351f98961f05890e16e9887d07864bd219cc864765804fd7b4403134023148f33e046b9fd38d12f0347a4597da38f310f787886cf5f0f6dc79704b875a22a46fbb172b785c2c35b072bdc", 0xf8, 0x3}, {&(0x7f0000000280)="aa93b429cf8a482f45adea67ef3bb27ac7bdfce2c58cd0f036713a0dd6e873f122ab0308b4080c9219a2704e35ae165d457658a7748c0f898c9413bc1fb5d0f90dadc127137f2b7f650856d93b9544fdd095686ec33296764ec15df9597849efdbeca6fb276ca7ee3854b1aea5f35a7b08821997ba8e499039accd5620f60a2b1f105b4071476f905fdf0b2573138b4af4a5715335f72c17c1a22baa19e95d49ad765622c2bd8a0bdb9856de6b072b10091f81b387b6c645539f8bcb41efbce4f7725473cbaf4602ea1a8dce0579461d07d9e3e29fe174141a651b161da08f738d01f464aea5", 0xe6, 0x3}, {&(0x7f0000000380)="4597356add79a8b95a888bcf79d72070e0eead85b4998e8216b6e9956e239b0400b04620b5eca132cb8b352df66f06d9703878797072761d84c8ebc2f1cc04683f667e5f43ce3cec45473050e7603cbcea87ca0fe4b420b30808cb18921f66035f7e51", 0x63, 0x6}, {&(0x7f0000000400)="b2d578821debb0663c91503360af5463cdc0845948b2b8e643d3909042fe9e0f0636e73d928c0640c054930c219e46b4dd68e1", 0x33, 0x3}, {&(0x7f0000000440)="416c4d3543cdc61f8d45964e30b7e15b", 0x10, 0x1ff}, {&(0x7f0000000480)="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", 0x1000, 0x4}, {&(0x7f0000001480)="657e8e9efb3c4750bc705082c0bcbaef22bd2d2866bfc827dd8cf0b033eda498fa744cea0650a4775d3f04d4bef3d34b62bf7a87f4cbd59cb293ddd5547857cf7bca7dd778e14f60ac1cd94d729e5e08d8f6b112f0e4bd2e3bd8811f898f7fd496d753396d62ae738e5f6054ac276c480b69d20f5fd5c5abe602fb4e9255d97d09d30c96801c0c25fcbbd33f4b076fc2a717", 0x92, 0x1}, {&(0x7f0000001540)="5fa5050c561189b3b2d1baac3dbd1a7d994981f5de97475043e83dc7bde237112c130d20fbce24f706e0c46842bfc156971a0aafb14319f3dc9177e19163b3924a10e99937c423c03d58e00b00a6013d4ba210c5fe1edf81b5b59a2d60b8620f20a90d35feb66d3a2b8422e63a86170128f29ec109a02e0c6169adde39b1565f36c31769ec4c69e4a38f83a37f577c7bedd8a14c8816ecf35eb5789d8b95cc98cc38046a5bc49ef7db7ff7aa9186d88092ddcc461e44f3f0e80e3a0f81e1cefcc73c7d5141", 0xc5, 0x6}], 0x2000004, &(0x7f0000001800)={[{@noacl='noacl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}]}) r3 = syz_open_dev$dmmidi(&(0x7f00000017c0)='/dev/dmmidi#\x00', 0xeefa, 0x40) readlinkat(r3, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880)=""/229, 0xe5) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:43 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:43 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1528.655769][ T6299] erofs: read_super, device -> /dev/loop3 [ 1528.678689][ T6299] erofs: options -> noacl,noacl,nouser_xattr,acl,noacl, 04:32:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1528.704140][ T6299] erofs: cannot find valid erofs superblock 04:32:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:43 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0xffffff03) 04:32:43 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:43 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) unshare(0x400) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:43 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, 0x0, &(0x7f0000000000)) [ 1529.377608][ T26] kauditd_printk_skb: 35 callbacks suppressed [ 1529.377621][ T26] audit: type=1400 audit(1555821163.873:23110): avc: denied { map } for pid=6336 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:43 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = io_uring_setup(0xf4c, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x2, 0x1}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="edc42663381a7bce06d4b9e938fd77c4b9f0311eb1d13800cd6e5098b13dddfb53a1db54c661529e09b7e2cdb2b72a6a08bd0bdc2b664328ad31d40264b4e986745247158e7816eb6e76717761fef30c32eca84b35cc67ddaeb8613e97d2e2c104c647faefd7aad5f3f1f823993b44cce47b7eab342ef9bae236246114d4d57497a209fae078a98cecedc3fd12e43f873c52a67e03b02c1c3c44bd375f904f4220a289a13ee878a161718f503cbeec4b1ea245a5010521ee8ad8a532b24e81fbfb5800"/204], 0xe, 0x2, 0x1000) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/192, 0xc0}], 0x1) r3 = semget(0x3, 0x1, 0x228) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x80800, 0x0) openat$cgroup_subtree(r4, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) semctl$GETNCNT(r3, 0x5, 0xe, &(0x7f0000000040)=""/181) r5 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x4, 0x2) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r6, 0x108, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000700)={0x8, &(0x7f00000006c0)=[{0x100000001, 0xffffffffce143312, 0xff, 0x224}, {0x6, 0x5, 0x6, 0x100000000}, {0xa3f1, 0x5, 0x1e7, 0x100000001}, {0x937c, 0x8001, 0x5, 0x8}, {0x8, 0x29a, 0x20, 0xffff00000000}, {0x8, 0x97f, 0xffffffffffff53b9, 0x6}, {0x2, 0x4, 0x80000000}, {0xd66, 0xb7d, 0x4, 0x200}]}, 0x10) r7 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x400, 0x480001) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000340)={r7}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 04:32:43 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:44 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, 0x0, &(0x7f0000000000)) 04:32:44 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1529.558209][ T26] audit: type=1400 audit(1555821163.873:23111): avc: denied { map } for pid=6338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) [ 1529.667041][ T26] audit: type=1400 audit(1555821163.963:23112): avc: denied { map } for pid=6342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:44 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1529.731768][ T26] audit: type=1400 audit(1555821164.013:23113): avc: denied { map } for pid=6343 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:44 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, 0x0, &(0x7f0000000000)) [ 1529.822280][ T26] audit: type=1400 audit(1555821164.053:23114): avc: denied { map } for pid=6347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1529.882487][ T26] audit: type=1400 audit(1555821164.053:23115): avc: denied { map } for pid=6348 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1529.911099][ T26] audit: type=1400 audit(1555821164.143:23116): avc: denied { map } for pid=6352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1529.959970][ T26] audit: type=1400 audit(1555821164.203:23117): avc: denied { map } for pid=6360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:44 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 04:32:44 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1530.011525][ T26] audit: type=1400 audit(1555821164.223:23118): avc: denied { map } for pid=6357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1530.052142][ T26] audit: type=1400 audit(1555821164.253:23119): avc: denied { create } for pid=6351 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 04:32:44 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget(0x1, 0x6, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0xa, 0x0, [{0xc224, 0x0, 0xad6}, {0x0, 0x0, 0x7}, {0x800, 0x0, 0x5}, {0x4, 0x0, 0x7}, {0xfffffffffffffffb, 0x0, 0xfffffffffffffeff}, {0xffffffffffffffed, 0x0, 0x1}, {0xfff, 0x0, 0x5}, {0x100000001, 0x0, 0xb97e}, {0x7ff, 0x0, 0x7}, {0x5, 0x0, 0x8}]}) r1 = semget(0x3, 0x3, 0x2) semctl$GETNCNT(r1, 0xfffffffffffffffc, 0xe, 0x0) 04:32:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:44 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, 0x0) 04:32:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 04:32:44 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:45 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, 0x0) 04:32:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 04:32:45 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 04:32:45 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x84) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f0000001080)=""/4096, 0x0) 04:32:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 04:32:45 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) bind(r0, &(0x7f0000000040)=@nl=@kern={0x10, 0x0, 0x0, 0x4}, 0x80) 04:32:45 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:45 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer2\x00', 0x0, 0x0) 04:32:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 04:32:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:46 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:46 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:46 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:46 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:46 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000100)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x0) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x2}, 0x7) 04:32:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:46 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:47 executing program 4: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:47 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:47 executing program 4: r0 = semget(0x2, 0x3, 0x1) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) semop(r0, &(0x7f0000000140)=[{0x3, 0x9}, {0x3, 0x0, 0x800}], 0x2) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x5}, 0xf) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f00000000c0)={0x7f, 0x4, 0x4}) 04:32:49 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:49 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:49 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget$private(0x0, 0x0, 0x100) semget(0x2, 0x7, 0x8) semget(0x0, 0x3, 0x80) r0 = semget(0x0, 0x7, 0x741) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 04:32:49 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r3) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1534.944231][ T26] kauditd_printk_skb: 46 callbacks suppressed [ 1534.944246][ T26] audit: type=1400 audit(1555821169.433:23166): avc: denied { map } for pid=6533 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1535.160925][ T26] audit: type=1400 audit(1555821169.653:23167): avc: denied { map } for pid=6548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1535.295768][ T26] audit: type=1400 audit(1555821169.783:23168): avc: denied { map } for pid=6549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1535.381155][ T26] audit: type=1400 audit(1555821169.873:23169): avc: denied { map } for pid=6552 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1535.469197][ T26] audit: type=1400 audit(1555821169.963:23170): avc: denied { map } for pid=6555 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:50 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:50 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1535.553502][ T26] audit: type=1400 audit(1555821170.043:23171): avc: denied { map } for pid=6558 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1535.632738][ T26] audit: type=1400 audit(1555821170.123:23172): avc: denied { map } for pid=6561 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:50 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:50 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1535.708621][ T26] audit: type=1400 audit(1555821170.203:23173): avc: denied { map } for pid=6564 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1535.803180][ T26] audit: type=1400 audit(1555821170.293:23174): avc: denied { map } for pid=6567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1535.984407][ T26] audit: type=1400 audit(1555821170.473:23175): avc: denied { map } for pid=6577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:52 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:52 executing program 4: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:52 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:52 executing program 3: semop(0x0, &(0x7f0000000040), 0x65ce75b046bfa3f) semctl$GETNCNT(0x0, 0x7, 0xe, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="dd473ae7ee5b1c09ef92beb2a5ff84b1", 0x10) 04:32:52 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:32:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:52 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$cec(&(0x7f0000003e80)='/dev/cec#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000003ec0)={'#! ', './file0', [{0x20, '\'\\selfppp0'}, {0x20, ':proc\x00'}], 0xa, "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"}, 0x101d) pkey_alloc(0x0, 0x2) 04:32:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:53 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1540.991974][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 1540.991988][ T26] audit: type=1400 audit(1555821175.483:23193): avc: denied { map } for pid=6641 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:55 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:55 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x5, 0x7, 0x81, 0x401}, {0xffffffff00000001, 0x5, 0xd25, 0x10001}, {0x0, 0x0, 0xaafb, 0xdd8}, {0x9, 0x5, 0xca}, {0x401, 0x1, 0x7, 0x2}]}) 04:32:55 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:55 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:55 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1541.032386][ T26] audit: type=1400 audit(1555821175.523:23194): avc: denied { map } for pid=6642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1541.125008][ T26] audit: type=1400 audit(1555821175.573:23195): avc: denied { map } for pid=6645 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:55 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1541.278758][ T26] audit: type=1400 audit(1555821175.773:23196): avc: denied { map } for pid=6664 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:55 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1541.452518][ T26] audit: type=1400 audit(1555821175.943:23197): avc: denied { map } for pid=6668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:56 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1541.587517][ T26] audit: type=1400 audit(1555821176.083:23198): avc: denied { map } for pid=6671 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1541.665151][ T26] audit: type=1400 audit(1555821176.153:23199): avc: denied { map } for pid=6674 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1541.743273][ T26] audit: type=1400 audit(1555821176.233:23200): avc: denied { map } for pid=6677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1541.842796][ T26] audit: type=1400 audit(1555821176.333:23201): avc: denied { map } for pid=6680 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1541.930976][ T26] audit: type=1400 audit(1555821176.413:23202): avc: denied { map } for pid=6683 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:32:58 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:58 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:58 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:32:58 executing program 3: r0 = semget$private(0x0, 0x1, 0x8) semop(r0, &(0x7f0000000000)=[{0x0, 0xfff}], 0x2aaaaaaaaaaaac11) semctl$GETNCNT(0x0, 0xfffffffffffffffe, 0xe, 0x0) 04:32:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:58 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001, 0x800}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:58 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:32:58 executing program 3: r0 = getgid() r1 = getgid() setregid(r0, r1) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x80) r3 = shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000000c0)=""/236) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x140, 0xe83) 04:32:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:32:59 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001, 0x800}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:32:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:01 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:01 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r0 = socket(0xa, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:01 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:01 executing program 4: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:01 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:01 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vfio/vfio\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x16, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000080000003b0f0600ecffffff970000003400"/40], &(0x7f0000000080)='GPL\x00', 0x80, 0x1000, &(0x7f00000000c0)=""/4096, 0x40f00, 0x1, [], 0x0, 0xf, r0, 0x8, &(0x7f0000001100)={0xbe, 0x9}, 0x8, 0x10, &(0x7f0000001140)={0xd0, 0x101, 0xfffffffffffffff9, 0x10001}, 0x10}, 0x70) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1547.218102][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 1547.218115][ T26] audit: type=1400 audit(1555821181.713:23222): avc: denied { map } for pid=6757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1547.252055][ T26] audit: type=1400 audit(1555821181.743:23223): avc: denied { prog_load } for pid=6751 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 1547.438759][ T26] audit: type=1400 audit(1555821181.933:23224): avc: denied { map } for pid=6771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1547.604620][ T26] audit: type=1400 audit(1555821182.093:23225): avc: denied { map } for pid=6772 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) r1 = socket(0xa, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1547.688108][ T26] audit: type=1400 audit(1555821182.183:23226): avc: denied { map } for pid=6775 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1547.762458][ T26] audit: type=1400 audit(1555821182.253:23227): avc: denied { map } for pid=6778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1547.852491][ T26] audit: type=1400 audit(1555821182.343:23228): avc: denied { map } for pid=6781 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1547.897695][ T26] audit: type=1400 audit(1555821182.393:23229): avc: denied { map } for pid=6784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:02 executing program 4: r0 = gettid() socket(0x0, 0x80f, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x5, 0x0) write(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_script(r1, 0x0, 0x0) tkill(r0, 0x15) [ 1547.987234][ T26] audit: type=1400 audit(1555821182.483:23230): avc: denied { map } for pid=6785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1548.072346][ T26] audit: type=1400 audit(1555821182.483:23231): avc: denied { map } for pid=6788 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:04 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:04 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) getpgid(0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:04 executing program 1: 04:33:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e23, @local}}, 0x3, 0xfffffffffffffffb, 0x3ff, 0x3, 0x40}, 0x98) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000080)=ANY=[@ANYBLOB="0300000000000000000000e4ffffff00"]) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000380)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x81, @ipv4={[], [], @rand_addr=0xe7a0c2d}, 0x8}}, 0x7, 0x4, 0x5, 0x7, 0x3}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x2, 0x4b, 0x1, 0x32f, 0xc3a3, 0xfffffffffffffff8, 0x0, 0x0, r4}, 0x20) 04:33:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x0, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:04 executing program 4: 04:33:04 executing program 1: 04:33:04 executing program 4: 04:33:04 executing program 3: r0 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000680)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xe8) syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x180, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000240)="4f1bf7967aecdc2600a62c66cf6c2d76053cf60a480414388f965c631d39bd77868add969c90005c5e86f657c1b7c8b8f70022fc20c5657b251bf30afe9be9cd80e00265468cffc03f62e3015e68c48a603ccbd332995e0c999fc74cfc6a898a2f5da905827015ce3554b3683f0e7a02facbac54560fb3", 0x77, 0x2}, {&(0x7f00000002c0)="29151f843ed9b5f8f2e1a300d43570552e587d1989b2bfff9c030ceb04c0c9c93b0e2cef2ed47b1b28229273e62d9ab1c4bfbc1cc238c7d735308edf3a2b5632c9ce5468bc61f5e938d2cd4a5d909ed154fb7540fac306067a7cd472011b1c429aa7dcaa0351d54e58b3f96142249ae5fc58ac4e731740fbbd4ed2a879aa95506d9155ab723544287120911f6535b8591a5e9f7a91e6932c7be6a3df0a2b716e1214ca29126d6e30c9f6e81f1a64c936dae8a939a4eab114ea7a3114464e189eb8f885511bb83a8ddbbd2da01f6afebf16f204c9c592f604222ef9444c0ad431360c1590162ad2", 0xe7, 0x2}], 0x2000008, &(0x7f0000000a80)=ANY=[@ANYBLOB='session=0x0000000000000100,gid=', @ANYRESHEX=r0, @ANYBLOB="35a1263e848a5f42029ebfb0c45e62dba97ec47065726d42745f6469724c6374696f2c736d61636b6673726f6f743d2f6465f62f73a97652b0f1285db6d14b9d7edd81eac9575cb37c48fa040b48cc6c6f508a3647b2bfab13bbd9afdab3b4cd74089a7ea2657ce75d895f04336272767f7f41399c020000000000008cb312dc0c7abda1835e8c0aca72eb36660dfb", @ANYRESDEC=r1, @ANYBLOB=',defcontext=sysadm_u,fowner=', @ANYRESDEC=r2, @ANYBLOB=',seclabel,uid=', @ANYRESDEC=r3, @ANYBLOB=',uid<', @ANYRESDEC=r4, @ANYBLOB=',\x00']) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget(0x2, 0x7, 0x400) r5 = semget$private(0x0, 0x4, 0x10a) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) ioctl$KDGKBLED(r6, 0x4b64, &(0x7f0000000080)) semctl$GETNCNT(r5, 0x0, 0xe, 0x0) io_setup(0x4, &(0x7f00000000c0)=0x0) io_pgetevents(r7, 0x4, 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0) 04:33:04 executing program 4: 04:33:04 executing program 1: 04:33:05 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000001c0)={0xe, 0x7, 0x401}) ioctl$TIOCEXCL(r0, 0x540c) semget(0x1, 0x6, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) r2 = semget(0x0, 0x6, 0x40) semctl$GETNCNT(r2, 0x0, 0xe, 0x0) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/237, 0xed) 04:33:07 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:07 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x0, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000002600)) 04:33:07 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 04:33:07 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1553.337425][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 1553.337440][ T26] audit: type=1400 audit(1555821187.833:23257): avc: denied { map } for pid=6845 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:07 executing program 4: request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000140)={'syz'}, 0x0, 0xfffffffffffffffe) [ 1553.382854][ T26] audit: type=1400 audit(1555821187.873:23258): avc: denied { map } for pid=6860 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:07 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:08 executing program 4: syz_execute_func(&(0x7f0000000340)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc66440fd480010000006f") clone(0x84007ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r1) mknod(&(0x7f0000000000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, 0x0) ptrace(0x11, r0) 04:33:08 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x0, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1553.525915][ T26] audit: type=1400 audit(1555821188.013:23259): avc: denied { map } for pid=6866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1553.577674][ T26] audit: type=1400 audit(1555821188.053:23260): avc: denied { map } for pid=6864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:08 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) [ 1553.630847][ T26] audit: type=1400 audit(1555821188.113:23261): avc: denied { map } for pid=6874 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1553.655505][ T26] audit: type=1400 audit(1555821188.123:23262): avc: denied { map } for pid=6877 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:08 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1553.742442][ T26] audit: type=1400 audit(1555821188.233:23263): avc: denied { map } for pid=6880 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1553.779082][ T26] audit: type=1400 audit(1555821188.233:23264): avc: denied { map } for pid=6886 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1553.803046][ T26] audit: type=1400 audit(1555821188.263:23265): avc: denied { map } for pid=6883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1553.840508][ T26] audit: type=1400 audit(1555821188.333:23266): avc: denied { map } for pid=6888 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:10 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:10 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:10 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:10 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:10 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 04:33:10 executing program 4: gettid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregset(0x4204, r0, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x80, 0x4, 0x7}}, 0x14) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) 04:33:11 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:11 executing program 2: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:11 executing program 4: epoll_create1(0x0) close(0xffffffffffffffff) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:11 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:11 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:11 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:11 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:11 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x2, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:11 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:14 executing program 2: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:14 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(r1, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:14 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:14 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x6a, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x72c1, 0x1}, 0x0, 0x0, &(0x7f0000000140)={0x22, 0xa9, 0x20, 0x1000}, &(0x7f0000000180)=0x20000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1559.790531][ T26] kauditd_printk_skb: 29 callbacks suppressed [ 1559.790546][ T26] audit: type=1400 audit(1555821194.283:23296): avc: denied { map } for pid=6989 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:14 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:14 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x9, 0x4}], 0x1) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x115e01) write$selinux_validatetrans(r0, &(0x7f0000000080)={'system_u:object_r:auditctl_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x800, 0x20, '/sbin/dhclient\x00'}, 0x58) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1559.932479][ T26] audit: type=1400 audit(1555821194.343:23297): avc: denied { map } for pid=6998 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1559.957280][ T26] audit: type=1400 audit(1555821194.353:23298): avc: denied { map } for pid=6997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1559.980620][ T26] audit: type=1400 audit(1555821194.453:23299): avc: denied { map } for pid=7009 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1560.119523][ T26] audit: type=1400 audit(1555821194.613:23300): avc: denied { map } for pid=7015 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1560.210430][ T26] audit: type=1400 audit(1555821194.703:23301): avc: denied { map } for pid=7017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1560.275156][ T26] audit: type=1400 audit(1555821194.703:23302): avc: denied { map } for pid=7018 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:14 executing program 3: semop(0x0, &(0x7f0000000000), 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1560.459988][ T26] audit: type=1400 audit(1555821194.753:23303): avc: denied { map } for pid=7021 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1560.512870][ T26] audit: type=1400 audit(1555821194.763:23304): avc: denied { map } for pid=7026 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1560.543946][ T26] audit: type=1400 audit(1555821194.823:23305): avc: denied { map } for pid=7029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:17 executing program 2: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:17 executing program 1: getpid() msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:17 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0)="193c69c331899c3ec70f8c2fe7f07ae8cdb17870ee20cce43ce99ac9e0c8be15e90cc1e62156bd86e9eabcc7a97f978d8746a4bfef0b41c689027c8371a3a04eec174307f5d0a8b100abddee58b943a980f10c0a37c92de002ba3fb7088e1793731c1fabd8df56b1d8300c41f574b4ea80431b217f1cc0", 0x77, 0x100000001}, {&(0x7f0000000140)="8f955f3ed1cbca93c640908f9781e14493cb50ebba2acf", 0x17, 0xd}, {&(0x7f0000000180)="25defcefe41d91a78164f94f8e45900e548a65f1db43e4b50aed28f454bfbcc23f4ad92702dff0f10823f7e34515379f710dddb88d70b2bfe7c98e93de6a0002d09b4880fb80adf1b7c575279ca519772e1f78f79b177a9a2e74126178f82475679b351ca0736750ad3ea6de9439e1794f71ee32c1b2529124c039f199698189200b7af1ddb3657c22542fb65be6152b12e3db8c6bbabaff82ef", 0x9a, 0x4}], 0x80000, &(0x7f00000004c0)={[{@barrier='barrier'}, {@decompose='decompose'}, {@gid={'gid', 0x3d, r0}}, {@nodecompose='nodecompose'}, {@type={'type', 0x3d, "d42062db"}}], [{@subj_role={'subj_role', 0x3d, '{%'}}, {@audit='audit'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_gt={'euid>', r1}}]}) r2 = semget$private(0x0, 0x3, 0x0) semop(r2, &(0x7f0000000540)=[{0x1, 0x7ff, 0x1000}, {0x0, 0x1, 0x1800}, {0x1, 0x5, 0x800}, {0x3, 0xffffffff, 0x1000}, {0xaa246952f81b6625, 0x8c2}, {0x0, 0x10001, 0x1000}, {0x3, 0x4, 0x1000}], 0x7) 04:33:17 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:17 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:17 executing program 3: semop(0x0, &(0x7f0000000100)=[{0x1, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x63d05d7c, 0x40000) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000140)={0x2, 0x5, 0x40, 0xb711, 0x1b, 0x20, 0x2, 0x2, 0x101, 0x81}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000080)=0x404000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f00000000c0)={0x0, 0x100000001, 0x6, 0xf47}) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) 04:33:17 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:17 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:17 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 04:33:17 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 04:33:20 executing program 2: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:20 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 04:33:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:20 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:20 executing program 3: r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000004c0)={'team_slave_1\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6, 0x8181) write$FUSE_BMAP(r1, &(0x7f0000000340)={0x18, 0xffffffffffffffda, 0x8, {0x4}}, 0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x2, 0x1, [0x6ee6aab0]}, &(0x7f0000000240)=0xa) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in={{0x2, 0x4e21, @rand_addr=0x4}}, 0xc7, 0x7, 0x100000000, 0x1501, 0x12}, 0x98) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x2, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x1}}, {@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@obj_user={'obj_user', 0x3d, '!'}}]}}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000500)={r2, 0xd9}, &(0x7f0000000540)=0xfffffffffffffeba) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={r4, @in={{0x2, 0x4e22, @local}}}, 0x84) 04:33:20 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) 04:33:20 executing program 2: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:20 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x1, "e3711156822340145fc95f36661d4a8d98ddbe8a5f164e3f7ce262ab8adf166f", 0x400, 0x6134, 0x9, 0x4}) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r1 = semget$private(0x0, 0x1, 0x25) semctl$SEM_STAT(r1, 0x1, 0x12, &(0x7f00000001c0)=""/185) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1565.940522][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 1565.940537][ T26] audit: type=1400 audit(1555821200.433:23331): avc: denied { map } for pid=7108 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.021095][ T26] audit: type=1400 audit(1555821200.443:23332): avc: denied { map } for pid=7117 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:20 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1566.190224][ T26] audit: type=1400 audit(1555821200.683:23333): avc: denied { map } for pid=7129 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:20 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080), 0x8, 0x0) 04:33:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1566.347498][ T26] audit: type=1400 audit(1555821200.713:23334): avc: denied { map } for pid=7128 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:20 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:20 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080), 0x8, 0x0) [ 1566.427924][ T26] audit: type=1400 audit(1555821200.723:23335): avc: denied { map } for pid=7132 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.454702][ T26] audit: type=1400 audit(1555821200.763:23336): avc: denied { map } for pid=7137 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.478949][ T26] audit: type=1400 audit(1555821200.803:23337): avc: denied { map } for pid=7136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.502299][ T26] audit: type=1400 audit(1555821200.833:23338): avc: denied { map } for pid=7141 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.525506][ T26] audit: type=1400 audit(1555821200.893:23339): avc: denied { map } for pid=7147 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1566.549282][ T26] audit: type=1400 audit(1555821200.913:23340): avc: denied { map } for pid=7150 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:21 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:21 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:21 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000080), 0x8, 0x0) 04:33:21 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:21 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:23 executing program 2: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:23 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000080)=@bcast) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:23 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:24 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:24 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:24 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:24 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:24 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:26 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:26 executing program 3: semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6d) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x0, "da624865156f6a3696f20af4a92c03560aac4deb68edb8e04d90f8bc1af22562", 0x2, 0x1}) 04:33:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:26 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:26 executing program 3: r0 = semget(0x3, 0x1, 0x20) socket$inet_udp(0x2, 0x2, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x8001, 0x3}], 0x1) io_setup(0xd6d0, &(0x7f0000000040)=0x0) io_getevents(r1, 0x6, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1572.253617][ T26] kauditd_printk_skb: 30 callbacks suppressed [ 1572.253650][ T26] audit: type=1400 audit(1555821206.743:23371): avc: denied { map } for pid=7244 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:26 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1572.299645][ T26] audit: type=1400 audit(1555821206.753:23372): avc: denied { map } for pid=7250 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.434800][ T26] audit: type=1400 audit(1555821206.923:23373): avc: denied { map } for pid=7257 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.461949][ T26] audit: type=1400 audit(1555821206.923:23374): avc: denied { map } for pid=7259 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1572.514383][ T26] audit: type=1400 audit(1555821206.923:23375): avc: denied { map } for pid=7258 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1572.551155][ T26] audit: type=1400 audit(1555821207.043:23376): avc: denied { map } for pid=7269 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.574936][ T26] audit: type=1400 audit(1555821207.063:23377): avc: denied { map } for pid=7267 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.662599][ T26] audit: type=1400 audit(1555821207.153:23378): avc: denied { map } for pid=7273 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.688126][ T26] audit: type=1400 audit(1555821207.153:23379): avc: denied { map } for pid=7270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1572.723145][ T26] audit: type=1400 audit(1555821207.213:23380): avc: denied { map } for pid=7274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:27 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:27 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:27 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semget(0x2, 0x0, 0x0) r0 = semget$private(0x0, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x40800) sendmsg$key(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1128}}, 0x4000000) r2 = add_key$keyring(&(0x7f0000001480)='keyring\x00', &(0x7f00000014c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r2, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001340)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001440)=0xe8) semctl$GETNCNT(r0, 0x3, 0xe, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40e01) syz_genetlink_get_family_id$fou(&(0x7f0000001300)='fou\x00') getsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000080)={@multicast2, @dev, @multicast2}, &(0x7f00000000c0)=0xc) 04:33:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:27 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:27 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:27 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:27 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:27 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:29 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:29 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:29 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:29 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:29 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:29 executing program 3: semop(0x0, &(0x7f0000000040)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:30 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:30 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:30 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:30 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:30 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:30 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:30 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:30 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:32 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:32 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:32 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x202, 0x0) getpeername$netrom(r0, &(0x7f0000000080)={{0x3, @bcast}, [@remote, @remote, @remote, @remote, @remote, @remote, @rose, @bcast]}, &(0x7f0000000100)=0x48) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1578.504618][ T26] kauditd_printk_skb: 36 callbacks suppressed [ 1578.504632][ T26] audit: type=1400 audit(1555821212.993:23417): avc: denied { map } for pid=7387 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1578.587309][ T26] audit: type=1400 audit(1555821213.063:23418): avc: denied { map } for pid=7395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1578.703334][ T26] audit: type=1400 audit(1555821213.083:23419): avc: denied { map } for pid=7396 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1578.757962][ T26] audit: type=1400 audit(1555821213.083:23420): avc: denied { map } for pid=7397 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1578.803005][ T26] audit: type=1400 audit(1555821213.193:23421): avc: denied { map } for pid=7403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:33 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:33 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1578.916080][ T26] audit: type=1400 audit(1555821213.333:23422): avc: denied { map } for pid=7407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1578.990470][ T26] audit: type=1400 audit(1555821213.343:23423): avc: denied { map } for pid=7408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1579.023222][ T26] audit: type=1400 audit(1555821213.343:23424): avc: denied { map } for pid=7409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1579.082373][ T26] audit: type=1400 audit(1555821213.383:23425): avc: denied { map } for pid=7415 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:33 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1579.111869][ T26] audit: type=1400 audit(1555821213.393:23426): avc: denied { map } for pid=7414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:33 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000700)=0x283) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:33 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101002, 0x0) recvfrom$x25(r0, &(0x7f00000001c0)=""/13, 0xd, 0x2040, &(0x7f0000000200)={0x9, @remote={[], 0x1}}, 0x12) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000240)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl(r1, 0xffffffffffffffe0, &(0x7f0000000080)="57c255500afaaf5f4ba78463ccc8676d2eed86c53dca600e4e684f5fcdb8c3d0e7783e72b05d6121871a4223152ef159494e26898e7b0df15fd9a7955b96a282dd587ea2aa2bfb43b1f1b5a89f130dfeb7a986569802f78afaf04650c92c7cfc2c7629f6ed2acd308d0317b4ecab3dd8de2ddb5476d8dc9157bdc1283eeea48b278a9a5c2a2d04f9367d732bb8611b3c345a47038149b899da2569c1c388877d83c0133681425a55aed7ad63b0eb7ac3445de9c2fe6d12aa3e0ceb91c1e5137eb9bc7a1daa976c88ebfffd8fcfb10cf3") semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:36 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:36 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 3: r0 = semget$private(0x0, 0x0, 0x3) semop(r0, &(0x7f0000000000)=[{0x1, 0x8001}], 0x1) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:36 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:36 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 1: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:39 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:39 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200200, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xe1, "69e3417f55d95184e59df1c087d964ddc24132a649e580bb0613b75f25edf4b43733c04fa4096c88175c4a3b9f05b703183d20aadd1b6e5a1fc2aacc3c959249f418d192223e1e99a2b332221d069ccf5257b1fa64945d244238b6bf8eb61a606dd8cc290e50c32b31d90ba82045ca91327ffc7c154975dad9f1b6a11f742f42f62c3e81300fa8b1d882459ca45c679891713c639dafb766966c79c72ff60484fb239b6f815e1c38a0a2dc523e28f9bc70476bcae41f18a30b51208f7bd3e1bb15366761bca1069b0098a3e52f5ea1465afbf21a134c6bc0742af54cf04667cbf5"}, &(0x7f0000000180)=0xe9) connect$vsock_dgram(r0, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r1, 0x8001}, &(0x7f0000000240)=0x8) r2 = semget$private(0x0, 0x3, 0x42) semctl$GETNCNT(r2, 0x80000003, 0xe, 0x0) 04:33:39 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1585.011265][ T26] kauditd_printk_skb: 29 callbacks suppressed [ 1585.011279][ T26] audit: type=1400 audit(1555821219.503:23456): avc: denied { map } for pid=7521 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:39 executing program 3: semget$private(0x0, 0x1000, 0xc0) r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x2, 0x800, 0x1800}, {0x1, 0x40009, 0x800}], 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000200)) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000240)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in=@multicast2, 0x4e23, 0x1f, 0x4e22, 0x3, 0xa, 0x20, 0xa0, 0x7f, r2, r3}, {0x8d0b, 0x100000000, 0x4000000000000000, 0xab, 0x9, 0x5, 0x1ff, 0x8}, {0x10000, 0x100000000, 0x1f, 0x3ff}, 0x9, 0x6e6bb4, 0x2, 0x1, 0x2}, {{@in=@remote, 0x4d2, 0x6c}, 0xa, @in6=@rand_addr="cd2c0404315305a2deb3ea1ce2ba0f2a", 0x0, 0x3, 0x2, 0x9, 0x1, 0x1000, 0x200}}, 0xe8) semop(r0, &(0x7f0000000080)=[{0x3, 0xcc, 0xffc}, {0x2, 0x5, 0x2}], 0x2) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x120000000000, 0x20}, &(0x7f00000004c0)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000500)={r5, 0x7ff}, &(0x7f0000000540)=0x8) getsockopt$inet_buf(r4, 0x0, 0x29, &(0x7f00000000c0)=""/229, &(0x7f0000000040)=0xe5) fsync(r4) [ 1585.050640][ T26] audit: type=1400 audit(1555821219.533:23457): avc: denied { map } for pid=7520 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:39 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000080)={0x1, 0x0, 0x2080, {0x1, 0x10f007, 0x2}, [], "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", "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"}) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 1585.131230][ T26] audit: type=1400 audit(1555821219.623:23458): avc: denied { map } for pid=7529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1585.188158][ T26] audit: type=1400 audit(1555821219.673:23459): avc: denied { map } for pid=7532 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1585.234761][ T26] audit: type=1400 audit(1555821219.723:23460): avc: denied { map } for pid=7535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1585.260410][ T26] audit: type=1400 audit(1555821219.733:23461): avc: denied { map } for pid=7538 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1585.312506][ T26] audit: type=1400 audit(1555821219.803:23462): avc: denied { map } for pid=7540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:39 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:39 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1585.352424][ T26] audit: type=1400 audit(1555821219.803:23463): avc: denied { map } for pid=7543 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:39 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1585.440901][ T26] audit: type=1400 audit(1555821219.893:23464): avc: denied { map } for pid=7544 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1585.490654][ T26] audit: type=1400 audit(1555821219.933:23465): avc: denied { map } for pid=7547 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:42 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:42 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:42 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:42 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:42 executing program 3: r0 = semget(0x2, 0x4, 0x47d) semop(r0, &(0x7f0000000000), 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:33:42 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:42 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:45 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:45 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:45 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:45 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1591.064548][ T26] kauditd_printk_skb: 24 callbacks suppressed [ 1591.064563][ T26] audit: type=1400 audit(1555821225.553:23490): avc: denied { map } for pid=7622 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1591.175389][ T26] audit: type=1400 audit(1555821225.663:23491): avc: denied { map } for pid=7627 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:45 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1591.213524][ T26] audit: type=1400 audit(1555821225.703:23492): avc: denied { map } for pid=7636 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1591.309714][ T26] audit: type=1400 audit(1555821225.793:23493): avc: denied { map } for pid=7639 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1591.352552][ T26] audit: type=1400 audit(1555821225.843:23494): avc: denied { map } for pid=7644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1591.381868][ T26] audit: type=1400 audit(1555821225.843:23495): avc: denied { map } for pid=7647 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:45 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 1591.490410][ T26] audit: type=1400 audit(1555821225.983:23496): avc: denied { map } for pid=7649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1591.578830][ T26] audit: type=1400 audit(1555821226.013:23497): avc: denied { map } for pid=7650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1591.602618][ T26] audit: type=1400 audit(1555821226.013:23498): avc: denied { map } for pid=7652 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1591.643155][ T26] audit: type=1400 audit(1555821226.133:23499): avc: denied { map } for pid=7657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:46 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:48 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:48 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:48 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:48 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:48 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r2 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r2) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:49 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:49 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:51 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1597.174846][ T26] kauditd_printk_skb: 34 callbacks suppressed [ 1597.174860][ T26] audit: type=1400 audit(1555821231.663:23534): avc: denied { map } for pid=7743 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1597.254929][ T26] audit: type=1400 audit(1555821231.743:23535): avc: denied { map } for pid=7747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:51 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:51 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1597.399955][ T26] audit: type=1400 audit(1555821231.893:23536): avc: denied { map } for pid=7753 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1597.443490][ T26] audit: type=1400 audit(1555821231.923:23537): avc: denied { map } for pid=7751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:52 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) 04:33:52 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:52 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:52 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1597.598577][ T26] audit: type=1400 audit(1555821232.093:23538): avc: denied { map } for pid=7760 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1597.647823][ T26] audit: type=1400 audit(1555821232.143:23539): avc: denied { map } for pid=7761 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:52 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1597.719291][ T26] audit: type=1400 audit(1555821232.213:23540): avc: denied { map } for pid=7768 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:52 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1597.833549][ T26] audit: type=1400 audit(1555821232.263:23541): avc: denied { map } for pid=7772 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1597.913097][ T26] audit: type=1400 audit(1555821232.293:23542): avc: denied { map } for pid=7776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1597.944267][ T26] audit: type=1400 audit(1555821232.323:23543): avc: denied { map } for pid=7778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:52 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0x0, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:53 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0x0, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:55 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket(0x0, 0x80002, 0x100) r1 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:55 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:55 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 3: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, 0x0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:55 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 3: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, 0x0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:56 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:56 executing program 3: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, 0x0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) 04:33:56 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:56 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1603.974753][ T26] kauditd_printk_skb: 38 callbacks suppressed [ 1603.974767][ T26] audit: type=1400 audit(1555821238.463:23582): avc: denied { map } for pid=7908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:58 executing program 2: epoll_create1(0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:58 executing program 0: shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) 04:33:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000), 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1604.192868][ T26] audit: type=1400 audit(1555821238.683:23583): avc: denied { map } for pid=7913 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:58 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:58 executing program 0: semop(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1604.229537][ T26] audit: type=1400 audit(1555821238.683:23584): avc: denied { map } for pid=7917 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000), 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1604.317985][ T26] audit: type=1400 audit(1555821238.813:23585): avc: denied { map } for pid=7923 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:58 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1604.378028][ T26] audit: type=1400 audit(1555821238.813:23586): avc: denied { map } for pid=7924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1604.401979][ T26] audit: type=1400 audit(1555821238.863:23587): avc: denied { map } for pid=7927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:58 executing program 0: semop(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000100)=""/49) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x3, {0x9, 0x107, 0x4, 0xfffffffffffffa68, 0x7, 0x5}, 0x2, 0x9}, 0xe) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0xfff, 0x10000, 0x26}) r1 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x10000000000000dd, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), &(0x7f0000000000)=0xc) [ 1604.458856][ T26] audit: type=1400 audit(1555821238.953:23588): avc: denied { map } for pid=7935 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:59 executing program 1: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) [ 1604.524215][ T26] audit: type=1400 audit(1555821238.953:23589): avc: denied { map } for pid=7934 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1604.682544][ T26] audit: type=1400 audit(1555821239.173:23590): avc: denied { map } for pid=7945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 04:33:59 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000000)=@profile={'permprofile ', '\x00'}, 0xd) 04:33:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r1 = socket(0x0, 0x80002, 0x100) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0xffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000001c0)=""/3) shmget$private(0x0, 0x3000, 0x3e4, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000), 0x1) ioctl$VT_OPENQRY(r2, 0x5600, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0xde0) mkdir(0xffffffffffffffff, 0x800000080) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) [ 1604.786347][ T26] audit: type=1400 audit(1555821239.183:23591): avc: denied { map } for pid=7946 comm="blkid" path="/sbin/blkid" dev="sda1" ino=15553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1604.949504][ T3724] ================================================================== [ 1604.958294][ T3724] BUG: KASAN: use-after-free in debugfs_remove+0x10d/0x130 [ 1604.958319][ T3724] Read of size 8 at addr ffff88804341e340 by task kworker/1:2/3724 [ 1604.958322][ T3724] [ 1604.958337][ T3724] CPU: 1 PID: 3724 Comm: kworker/1:2 Not tainted 5.1.0-rc5+ #77 [ 1604.958345][ T3724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.958385][ T3724] Workqueue: events __blk_release_queue [ 1604.958393][ T3724] Call Trace: [ 1604.958419][ T3724] dump_stack+0x172/0x1f0 [ 1604.958434][ T3724] ? debugfs_remove+0x10d/0x130 [ 1604.958454][ T3724] print_address_description.cold+0x7c/0x20d [ 1604.958466][ T3724] ? debugfs_remove+0x10d/0x130 [ 1604.958480][ T3724] ? debugfs_remove+0x10d/0x130 [ 1604.958493][ T3724] kasan_report.cold+0x1b/0x40 [ 1604.958506][ T3724] ? kobject_put+0x30/0xe0 [ 1604.958518][ T3724] ? debugfs_remove+0x10d/0x130 [ 1604.958536][ T3724] __asan_report_load8_noabort+0x14/0x20 [ 1604.958550][ T3724] debugfs_remove+0x10d/0x130 [ 1604.958568][ T3724] blk_trace_free+0x38/0x140 [ 1604.958580][ T3724] __blk_trace_remove+0x78/0xa0 [ 1604.958602][ T3724] blk_trace_shutdown+0x67/0x90 [ 1604.973718][ T3724] __blk_release_queue+0x1dc/0x3a0 [ 1604.973745][ T3724] process_one_work+0x98e/0x1790 [ 1604.973783][ T3724] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1604.973798][ T3724] ? lock_acquire+0x16f/0x3f0 [ 1604.973840][ T3724] worker_thread+0x98/0xe40 [ 1604.983847][ T3724] kthread+0x357/0x430 [ 1604.983864][ T3724] ? process_one_work+0x1790/0x1790 [ 1604.983884][ T3724] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1605.002759][ T3724] ret_from_fork+0x3a/0x50 [ 1605.002791][ T3724] [ 1605.002804][ T3724] Allocated by task 7944: [ 1605.009840][ T7964] kobject: '7:0' (00000000848c9132): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 1605.012001][ T3724] save_stack+0x45/0xd0 [ 1605.012018][ T3724] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1605.012027][ T3724] kasan_slab_alloc+0xf/0x20 [ 1605.012044][ T3724] kmem_cache_alloc+0x11a/0x6f0 [ 1605.064787][ T7964] kobject: 'loop0' (000000004e62df79): kobject_add_internal: parent: 'block', set: 'devices' [ 1605.066222][ T3724] __d_alloc+0x2e/0x8c0 [ 1605.066234][ T3724] d_alloc+0x4d/0x2b0 [ 1605.066245][ T3724] d_alloc_parallel+0xf4/0x1bc0 [ 1605.066256][ T3724] __lookup_slow+0x1ab/0x500 [ 1605.066265][ T3724] lookup_one_len+0x16d/0x1a0 [ 1605.066277][ T3724] start_creating+0xbf/0x1e0 [ 1605.066294][ T3724] __debugfs_create_file+0x65/0x400 [ 1605.066304][ T3724] debugfs_create_file+0x5a/0x70 [ 1605.066318][ T3724] do_blk_trace_setup+0x376/0xb90 [ 1605.066330][ T3724] __blk_trace_setup+0xe3/0x190 [ 1605.066343][ T3724] blk_trace_ioctl+0x170/0x300 [ 1605.066356][ T3724] blkdev_ioctl+0x276/0x1d10 [ 1605.066369][ T3724] block_ioctl+0xee/0x130 [ 1605.066380][ T3724] do_vfs_ioctl+0xd6e/0x1390 [ 1605.066390][ T3724] ksys_ioctl+0xab/0xd0 [ 1605.066401][ T3724] __x64_sys_ioctl+0x73/0xb0 [ 1605.066420][ T3724] do_syscall_64+0x103/0x610 [ 1605.073325][ T7964] kobject: 'loop0' (000000004e62df79): kobject_uevent_env [ 1605.076459][ T3724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.076464][ T3724] [ 1605.076472][ T3724] Freed by task 7944: [ 1605.076489][ T3724] save_stack+0x45/0xd0 [ 1605.076500][ T3724] __kasan_slab_free+0x102/0x150 [ 1605.076509][ T3724] kasan_slab_free+0xe/0x10 [ 1605.076522][ T3724] kmem_cache_free+0x86/0x260 [ 1605.076535][ T3724] __d_free+0x20/0x30 [ 1605.076548][ T3724] rcu_core+0x916/0x13a0 [ 1605.076561][ T3724] __do_softirq+0x266/0x95a [ 1605.076564][ T3724] [ 1605.076576][ T3724] The buggy address belongs to the object at ffff88804341e300 [ 1605.076576][ T3724] which belongs to the cache dentry(17:syz0) of size 288 [ 1605.076587][ T3724] The buggy address is located 64 bytes inside of [ 1605.076587][ T3724] 288-byte region [ffff88804341e300, ffff88804341e420) [ 1605.076593][ T3724] The buggy address belongs to the page: [ 1605.076606][ T3724] page:ffffea00010d0780 count:1 mapcount:0 mapping:ffff88809afed200 index:0x0 [ 1605.076624][ T3724] flags: 0x1fffc0000000200(slab) [ 1605.090134][ T7964] kobject: 'loop0' (000000004e62df79): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1605.091135][ T3724] raw: 01fffc0000000200 ffffea00013803c8 ffff88809ac84948 ffff88809afed200 [ 1605.091153][ T3724] raw: 0000000000000000 ffff88804341e040 000000010000000b ffff88805be8e880 [ 1605.091159][ T3724] page dumped because: kasan: bad access detected [ 1605.091166][ T3724] page->mem_cgroup:ffff88805be8e880 [ 1605.091169][ T3724] [ 1605.091180][ T3724] Memory state around the buggy address: [ 1605.103984][ T7964] kobject: 'holders' (00000000572934eb): kobject_add_internal: parent: 'loop0', set: '' [ 1605.106639][ T3724] ffff88804341e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1605.106651][ T3724] ffff88804341e280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1605.106662][ T3724] >ffff88804341e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1605.106668][ T3724] ^ [ 1605.106677][ T3724] ffff88804341e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1605.106686][ T3724] ffff88804341e400: fb fb fb fb fc fc fc fc fc fc fc fc 00 00 00 00 [ 1605.106691][ T3724] ================================================================== [ 1605.106696][ T3724] Disabling lock debugging due to kernel taint [ 1605.107269][ T3724] Kernel panic - not syncing: panic_on_warn set ... [ 1605.111505][ T7964] kobject: 'slaves' (000000002adbcc4a): kobject_add_internal: parent: 'loop0', set: '' [ 1605.113504][ T3724] CPU: 1 PID: 3724 Comm: kworker/1:2 Tainted: G B 5.1.0-rc5+ #77 [ 1605.113512][ T3724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.113530][ T3724] Workqueue: events __blk_release_queue [ 1605.123348][ T7964] kobject: 'loop0' (000000004e62df79): kobject_uevent_env [ 1605.127533][ T3724] Call Trace: [ 1605.127555][ T3724] dump_stack+0x172/0x1f0 [ 1605.127572][ T3724] panic+0x2cb/0x65c [ 1605.127586][ T3724] ? __warn_printk+0xf3/0xf3 [ 1605.127601][ T3724] ? debugfs_remove+0x10d/0x130 [ 1605.127620][ T3724] ? preempt_schedule+0x4b/0x60 [ 1605.131865][ T7964] kobject: 'loop0' (000000004e62df79): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1605.137375][ T3724] ? ___preempt_schedule+0x16/0x18 [ 1605.137391][ T3724] ? trace_hardirqs_on+0x5e/0x230 [ 1605.137405][ T3724] ? debugfs_remove+0x10d/0x130 [ 1605.137417][ T3724] end_report+0x47/0x4f [ 1605.137429][ T3724] ? debugfs_remove+0x10d/0x130 [ 1605.137439][ T3724] kasan_report.cold+0xe/0x40 [ 1605.137451][ T3724] ? kobject_put+0x30/0xe0 [ 1605.137467][ T3724] ? debugfs_remove+0x10d/0x130 [ 1605.149172][ T7964] kobject: 'queue' (0000000095f18691): kobject_add_internal: parent: 'loop0', set: '' [ 1605.157091][ T3724] __asan_report_load8_noabort+0x14/0x20 [ 1605.157106][ T3724] debugfs_remove+0x10d/0x130 [ 1605.157120][ T3724] blk_trace_free+0x38/0x140 [ 1605.157131][ T3724] __blk_trace_remove+0x78/0xa0 [ 1605.157144][ T3724] blk_trace_shutdown+0x67/0x90 [ 1605.157160][ T3724] __blk_release_queue+0x1dc/0x3a0 [ 1605.157183][ T3724] process_one_work+0x98e/0x1790 [ 1605.166081][ T7964] kobject: 'mq' (0000000070893dc5): kobject_add_internal: parent: 'loop0', set: '' [ 1605.170143][ T3724] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1605.170156][ T3724] ? lock_acquire+0x16f/0x3f0 [ 1605.170177][ T3724] worker_thread+0x98/0xe40 [ 1605.170197][ T3724] kthread+0x357/0x430 [ 1605.170217][ T3724] ? process_one_work+0x1790/0x1790 [ 1605.174862][ T7964] kobject: 'mq' (0000000070893dc5): kobject_uevent_env [ 1605.179452][ T3724] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1605.179469][ T3724] ret_from_fork+0x3a/0x50 [ 1605.180611][ T3724] Kernel Offset: disabled [ 1605.680370][ T3724] Rebooting in 86400 seconds..