pt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="7261770018000000000000000000000000000000000000000000dfffffffffff0800000003000000d8020000f0000000f00000000000000100000000f0000000080200000802000008020000080200000802000003000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004354000000000000000000000000000000000000000000000000000000000100000000000000ff7fffff736e6d7000000000000000000000000000000000ff00000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aaffffff00ff0000000bbb4dfd00000000000000fffeffff00000000ff3205ed8c76657468315f746f5f7465616d00000065716c00000000000000000000000000ff000000000000000000000000000000ff000000000000000000000000000000080008004800000000000000d000180100000000000000000000000000000000000000000000000028006970763668656164657200000000000000000000000000000000000000000808010000000000480043540000000000000000000000000000000000000000000000000000000001006c9609000000ff000000736e6d700000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x3)

16:42:33 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000500)={0x2, 0x18, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, @in6={0x2, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xe0}}, 0x0)

16:42:33 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x4000000000000a, 0x300)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10)

16:42:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0xd)
write(r2, &(0x7f0000000040)="e0", 0xfffffe00)
ioctl$TIOCSETD(r2, 0x5437, 0x0)

16:42:33 executing program 5:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="68ebb91f00cf", [], {@ipv6={0x4305, {0x0, 0x6, "0f00", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0)

16:42:33 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="7261770018000000000000000000000000000000000000000000dfffffffffff0800000003000000d8020000f0000000f00000000000000100000000f0000000080200000802000008020000080200000802000003000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004354000000000000000000000000000000000000000000000000000000000100000000000000ff7fffff736e6d7000000000000000000000000000000000ff00000000000000fe8000000000000000000000000000aafe8000000000000000000000000000aaffffff00ff0000000bbb4dfd00000000000000fffeffff00000000ff3205ed8c76657468315f746f5f7465616d00000065716c00000000000000000000000000ff000000000000000000000000000000ff000000000000000000000000000000080008004800000000000000d000180100000000000000000000000000000000000000000000000028006970763668656164657200000000000000000000000000000000000000000808010000000000480043540000000000000000000000000000000000000000000000000000000001006c9609000000ff000000736e6d700000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x3)

[  923.245309] protocol 88fb is buggy, dev hsr_slave_0
[  923.250472] protocol 88fb is buggy, dev hsr_slave_1
16:42:36 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x4000000000000a, 0x300)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10)

16:42:36 executing program 1:
r0 = socket(0x10, 0x803, 0x0)
bind$netlink(r0, &(0x7f0000000380)={0x10, 0x0, 0x0, 0x12090100}, 0xc)
getsockname$packet(r0, 0x0, &(0x7f0000000200))

16:42:36 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x22, 0x2, 0x1)

16:42:36 executing program 5:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="68ebb91f00cf", [], {@ipv6={0x4305, {0x0, 0x6, "0f00", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0)

16:42:36 executing program 3:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4)
setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0)
setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4)
sendto$inet6(r0, &(0x7f0000adb000)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524cf9ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c906a38cbda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be7700d66f2d2c3a63dba8eb35e7127246029e222f0b2aebbe767f5125e2d9ea5d5987b9bb96f303e4f3c647c776c5b6306472896dcebe0de6d001b453a4e26dfe433b409586e0faca3ee89e8b936ea46b97a0f663544a8f4784c6b484334949f583b02557645c7d7884910eaf4879da3f4f37ce789b728a49d0546730e2adb0a9cb74620b0cf3a28061a607089a47a23e831c16dd002fc6ad4ebd7c62d265da40d6bfd145698d18d14522e19aa599cd9e412c4644dccb31849bd5e31411c6ff9249be50762cc6fdaa01a7cdcb162dc0516524002b688a462f69b6cce348a6dc5e9356ae3938909ea062f9501220214e83a4e621b8d685925c92c7564e9132cfe10f8acb646b731114ff101479f99d70a4bd6033bf5e4e6675120fa21d0610a685af21ba76162fa5cc571056b295b8f9987fdef14526be89516234dee2d93bf7ceba533af07bb7a6e9f1d5756f81a7558b5e029e662c5dfe00f657bd5a5165c6d44bd90f719342b7ac36eb8f10cdaeda44c079ecb31d324125ac848a27ba173ad35d1acd4e206387ecea474d6a70086d225448e247bfcd51ecae1f15dfe10acc50e7757cca9c5ef80562b63224c3259d6d1fc928264d356b8345ba03e10cd6970c0343ee98359dcb5920b83cb0aa034807f40050c6cf63543e107d85bfa82ce4f5e90f6078a743b0c7ccdd007c7c0115abfd5a9a52873b7b5da78a1ab7404016c5d00aabcfc3e16070b8222a99efebebf6042e6da1dbb3e782d831c0eb4f464b82abc0a8", 0x7d0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)

16:42:36 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000500)={0x2, 0x18, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, @in6={0x2, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xe0}}, 0x0)

16:42:36 executing program 5:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="68ebb91f00cf", [], {@ipv6={0x4305, {0x0, 0x6, "0f00", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0)

16:42:36 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000500)={0x2, 0x18, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, @in6={0x2, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xe0}}, 0x0)

16:42:36 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x22, 0x2, 0x1)

16:42:36 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x0, 0x3}})

16:42:36 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
pipe(&(0x7f0000000200))
r2 = creat(0x0, 0x62)
sendmsg$IPVS_CMD_GET_CONFIG(r2, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x4, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x427)
ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, 0x0)
openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11)
r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0)
getsockname$unix(r4, &(0x7f0000000200), 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

[  925.732113] kauditd_printk_skb: 155 callbacks suppressed
[  925.732130] audit: type=1400 audit(1577724156.545:8652): avc:  denied  { map } for  pid=24060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  925.906057] audit: type=1400 audit(1577724156.545:8653): avc:  denied  { map } for  pid=24060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  926.036294] audit: type=1400 audit(1577724156.595:8654): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:37 executing program 1:
r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20008088)
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140))

[  926.215274] audit: type=1400 audit(1577724156.605:8655): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:37 executing program 5:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="68ebb91f00cf", [], {@ipv6={0x4305, {0x0, 0x6, "0f00", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0)

[  926.405286] audit: type=1400 audit(1577724156.605:8656): avc:  denied  { map } for  pid=24060 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  926.549137] audit: type=1400 audit(1577724156.675:8657): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:37 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x22, 0x2, 0x1)

16:42:37 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000500)={0x2, 0x18, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, @in6={0x2, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast2, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xe0}}, 0x0)

16:42:37 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x0, 0x3}})

[  926.796384] audit: type=1400 audit(1577724156.675:8658): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  926.985649] audit: type=1400 audit(1577724156.785:8659): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:37 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10)
setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x2, 0x4)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
sendmmsg(r0, &(0x7f0000007c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)

[  927.154326] audit: type=1400 audit(1577724156.785:8660): avc:  denied  { map } for  pid=24060 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:38 executing program 1:
r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20008088)
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140))

[  927.327442] audit: type=1400 audit(1577724156.825:8661): avc:  denied  { map } for  pid=24062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:38 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP(r1, 0x4040ae79, &(0x7f0000000000))

16:42:38 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x0, 0x3}})

16:42:38 executing program 0:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000100), 0x8)
setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0xb, 0x0, 0x0)

16:42:38 executing program 4:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x22, 0x2, 0x1)

16:42:38 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}}, &(0x7f0000000300)=""/4096, 0x32, 0x1000, 0x1}, 0x20)

16:42:39 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000002fe8)=[{0x15, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10)

16:42:39 executing program 1:
r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20008088)
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140))

16:42:39 executing program 2:
r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x0, 0x3}})

16:42:39 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)={0x30, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0x18, 0x1, [@typed={0x14, 0x10, @ipv6=@ipv4={[0x4, 0x0, 0xb, 0x0, 0x4, 0x0, 0x8], [], @loopback}}]}]}, 0x30}}, 0x0)

16:42:39 executing program 0:
r0 = socket$kcm(0xa, 0x1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x245)

16:42:39 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}}, &(0x7f0000000300)=""/4096, 0x32, 0x1000, 0x1}, 0x20)

16:42:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000002fe8)=[{0x15, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10)

16:42:40 executing program 2:
clock_adjtime(0x0, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ppoll(0x0, 0xfffffffffffffecd, &(0x7f0000000280), 0x0, 0x0)
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz1\x00', {0x20}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0xffff0001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040))
getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)

[  929.653244] openvswitch: netlink: Multiple metadata blocks provided
16:42:40 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)={0x30, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0x18, 0x1, [@typed={0x14, 0x10, @ipv6=@ipv4={[0x4, 0x0, 0xb, 0x0, 0x4, 0x0, 0x8], [], @loopback}}]}]}, 0x30}}, 0x0)

16:42:40 executing program 1:
r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20008088)
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140))

16:42:40 executing program 0:
r0 = socket$kcm(0xa, 0x1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x245)

16:42:40 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}}, &(0x7f0000000300)=""/4096, 0x32, 0x1000, 0x1}, 0x20)

16:42:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000002fe8)=[{0x15, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10)

16:42:41 executing program 1:
open(&(0x7f0000000040)='.\x00', 0x0, 0x0)
clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00')
r0 = gettid()
tkill(r0, 0x40020000000c)
r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d\x06\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xff\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x15\xed3\xa7\xa5\xa3/\xf0\x96\x0f\xf9\xfa\xf93\x8c\x13opn\xc0\f\xa0L\x987\v\x01\xe7<\xfeg.w\xf85\xab\xf6\xad\v\xcd~z\xbb\x0e5\x9aPV\xf6*\xfa\xc5\xd4E\xef\x9b\xa5\\\xf0F\xde\x89.\xf2B\xa7OK\x88\xfe\xe3\xab\x92l\xe3\x85/\xcfG\xce\x91\x8c\x88\xecEw\xd8\xbfb\x92\xfa\xb8\a\x11\x18\xbe\xc7\xb4wB\xff/k\xe1\xe1+\xaf\xe9\xc4\x97\x9fJ\xfb\xc0-_\x185\x90P\xd6\xd8\xd1%\xc5 \xdf\x17\x97v\xb7')
write$P9_RSTATu(r1, 0x0, 0x0)

16:42:41 executing program 0:
r0 = socket$kcm(0xa, 0x1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x245)

[  930.720034] openvswitch: netlink: Multiple metadata blocks provided
[  930.751127] kauditd_printk_skb: 205 callbacks suppressed
[  930.751144] audit: type=1400 audit(1577724161.565:8867): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:41 executing program 3:
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}}, &(0x7f0000000300)=""/4096, 0x32, 0x1000, 0x1}, 0x20)

16:42:41 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000507d25a80648c63940d0524fc6010083d400a294a00053582c137153e3709003d8000f01700d1bd", 0x33fe0}], 0x1}, 0x0)
socket$kcm(0x2, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0)

16:42:41 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)={0x30, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0x18, 0x1, [@typed={0x14, 0x10, @ipv6=@ipv4={[0x4, 0x0, 0xb, 0x0, 0x4, 0x0, 0x8], [], @loopback}}]}]}, 0x30}}, 0x0)

[  930.962402] audit: type=1400 audit(1577724161.575:8868): avc:  denied  { map } for  pid=24141 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:41 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x3, &(0x7f0000002fe8)=[{0x15, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10)

[  931.166230] audit: type=1400 audit(1577724161.575:8869): avc:  denied  { map } for  pid=24141 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  931.369967] audit: type=1400 audit(1577724161.605:8870): avc:  denied  { map } for  pid=24139 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  931.517823] audit: type=1400 audit(1577724161.605:8871): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:42 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0)

[  931.666086] audit: type=1400 audit(1577724161.635:8872): avc:  denied  { map } for  pid=24147 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:42 executing program 0:
r0 = socket$kcm(0xa, 0x1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000100), 0x245)

[  931.768163] openvswitch: netlink: Multiple metadata blocks provided
16:42:42 executing program 3:
r0 = socket(0x80000000000000a, 0x2, 0x0)
getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000680))

[  931.826461] audit: type=1400 audit(1577724161.685:8873): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:42 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)={0x30, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0x18, 0x1, [@typed={0x14, 0x10, @ipv6=@ipv4={[0x4, 0x0, 0xb, 0x0, 0x4, 0x0, 0x8], [], @loopback}}]}]}, 0x30}}, 0x0)

[  931.996043] audit: type=1400 audit(1577724161.685:8874): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:43 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

[  932.202142] audit: type=1400 audit(1577724161.745:8875): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  932.341006] audit: type=1400 audit(1577724161.745:8876): avc:  denied  { map } for  pid=24147 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:43 executing program 0:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
dup2(r1, r0)

16:42:43 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, 0x0)
ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
sendmsg$nl_crypto(0xffffffffffffffff, 0x0, 0x40)
socket(0x10, 0x803, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0)
getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
accept$packet(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r4, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}}}, 0x30}}, 0x0)
sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x8000)
socket$inet_sctp(0x2, 0x0, 0x84)

16:42:43 executing program 3:
r0 = socket(0x80000000000000a, 0x2, 0x0)
getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000680))

16:42:43 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  932.869119] openvswitch: netlink: Multiple metadata blocks provided
16:42:44 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213e0325f1a390101050c0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28)

[  933.312476] bond0: Error: Device is in use and cannot be enslaved
16:42:44 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

16:42:44 executing program 3:
r0 = socket(0x80000000000000a, 0x2, 0x0)
getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000680))

16:42:45 executing program 0:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

16:42:45 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213e0325f1a390101050c0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28)

16:42:45 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r2, &(0x7f00000015c0), 0x10000005c)
fadvise64(r2, 0x0, 0x0, 0x4)

16:42:45 executing program 3:
r0 = socket(0x80000000000000a, 0x2, 0x0)
getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000680))

[  935.063487] bond0: Error: Device is in use and cannot be enslaved
16:42:46 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

[  935.736369] bond0: Error: Device is in use and cannot be enslaved
16:42:46 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213e0325f1a390101050c0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28)

16:42:46 executing program 0:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

16:42:46 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

[  936.080278] kauditd_printk_skb: 249 callbacks suppressed
[  936.080294] audit: type=1400 audit(1577724166.895:9126): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  936.284200] audit: type=1400 audit(1577724166.935:9127): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  936.465314] audit: type=1400 audit(1577724166.985:9128): avc:  denied  { map } for  pid=24248 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  936.645346] audit: type=1400 audit(1577724166.985:9129): avc:  denied  { map } for  pid=24248 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  936.850626] audit: type=1400 audit(1577724166.995:9130): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.026327] audit: type=1400 audit(1577724166.995:9131): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.101277] encrypted_key: insufficient parameters specified
[  937.231678] audit: type=1400 audit(1577724167.035:9132): avc:  denied  { map } for  pid=24248 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.373556] audit: type=1400 audit(1577724167.035:9133): avc:  denied  { map } for  pid=24248 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.502228] audit: type=1400 audit(1577724167.075:9134): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.549660] encrypted_key: insufficient parameters specified
[  937.591812] audit: type=1400 audit(1577724167.095:9136): avc:  denied  { map } for  pid=24241 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  937.632763] device syz_tun left promiscuous mode
[  937.655309] bridge3: port 1(syz_tun) entered disabled state
[  937.776060] bond0: Error: Device is in use and cannot be enslaved
[  937.783582] bond0: Error: Device is in use and cannot be enslaved
[  940.392799] IPVS: ftp: loaded support on port[0] = 21
[  940.556920] chnl_net:caif_netlink_parms(): no params data found
[  940.636468] bridge0: port 1(bridge_slave_0) entered blocking state
[  940.643103] bridge0: port 1(bridge_slave_0) entered disabled state
[  940.656073] device bridge_slave_0 entered promiscuous mode
[  940.672157] bridge0: port 2(bridge_slave_1) entered blocking state
[  940.678811] bridge0: port 2(bridge_slave_1) entered disabled state
[  940.687722] device bridge_slave_1 entered promiscuous mode
[  940.762672] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  940.774951] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  940.801421] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  940.809002] team0: Port device team_slave_0 added
[  940.866105] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  940.873788] team0: Port device team_slave_1 added
[  940.885145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  940.898073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  941.007268] device hsr_slave_0 entered promiscuous mode
[  941.045574] device hsr_slave_1 entered promiscuous mode
[  941.167834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  941.181021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  941.279150] bridge0: port 2(bridge_slave_1) entered blocking state
[  941.286099] bridge0: port 2(bridge_slave_1) entered forwarding state
[  941.292817] bridge0: port 1(bridge_slave_0) entered blocking state
[  941.299275] bridge0: port 1(bridge_slave_0) entered forwarding state
[  941.610154] bridge0: port 1(bridge_slave_0) entered disabled state
[  941.618306] bridge0: port 2(bridge_slave_1) entered disabled state
[  941.633451] 8021q: adding VLAN 0 to HW filter on device bond0
[  941.673307] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  941.708328] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  941.768499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  941.778909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  941.792950] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  941.799625] 8021q: adding VLAN 0 to HW filter on device team0
[  941.858894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  941.866253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  941.875088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  941.889131] bridge0: port 1(bridge_slave_0) entered blocking state
[  941.895580] bridge0: port 1(bridge_slave_0) entered forwarding state
[  941.954489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  941.962121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  941.970350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  941.978374] bridge0: port 2(bridge_slave_1) entered blocking state
[  941.984955] bridge0: port 2(bridge_slave_1) entered forwarding state
[  942.037693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  942.046927] device bridge_slave_1 left promiscuous mode
[  942.052726] bridge0: port 2(bridge_slave_1) entered disabled state
[  945.568050] device hsr_slave_1 left promiscuous mode
[  945.608371] device hsr_slave_0 left promiscuous mode
[  945.668560] team0 (unregistering): Port device team_slave_1 removed
[  945.680460] team0 (unregistering): Port device team_slave_0 removed
[  945.691687] bond0 (unregistering): Releasing backup interface bond_slave_1
[  945.719332] bond0 (unregistering): Releasing backup interface bond_slave_0
[  945.801804] bond0 (unregistering): Released all slaves
[  945.850042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  945.864470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  945.872414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  945.892903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  945.899909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  945.908591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  945.924275] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  945.931703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  945.938858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  945.947126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  945.979767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  945.987217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  945.994963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  946.010076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  946.017749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  946.030393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  946.101950] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  946.114016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  946.182450] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  946.204911] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  946.217350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  946.224109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  946.280446] 8021q: adding VLAN 0 to HW filter on device batadv0
[  946.320799] kauditd_printk_skb: 122 callbacks suppressed
[  946.320817] audit: type=1400 audit(1577724177.135:9258): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.392297] audit: type=1400 audit(1577724177.175:9259): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.435348] audit: type=1400 audit(1577724177.175:9260): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.474399] audit: type=1400 audit(1577724177.175:9261): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.507199] audit: type=1400 audit(1577724177.195:9262): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.548476] audit: type=1400 audit(1577724177.195:9263): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.621077] audit: type=1400 audit(1577724177.235:9264): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.653208] audit: type=1400 audit(1577724177.245:9265): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.693408] audit: type=1400 audit(1577724177.245:9266): avc:  denied  { map } for  pid=24277 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  946.761794] audit: type=1400 audit(1577724177.305:9267): avc:  denied  { map } for  pid=24278 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:42:58 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab840213e0325f1a390101050c0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28)

16:42:58 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x13, 0x10, 0x3, 0x3f}, 0x3c)

16:42:58 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

16:42:58 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

16:42:58 executing program 5:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

16:42:58 executing program 0:
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(0x0, 0x2, 0x2)
ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, &(0x7f00000004c0))
ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
r3 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000280)={0x8, 0xe3e1, 0x0, 0x0, 0x5, [{}, {0xfffffffffffffffb}, {0x0, 0x6, 0x6}, {0x0, 0x5}, {0x9, 0x5, 0x9}]})
chroot(&(0x7f0000000000)='./file0\x00')
r4 = dup(0xffffffffffffffff)
setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f0000000040)=0x1, 0x4)
keyctl$session_to_parent(0x12)
ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'})

16:42:59 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x13, 0x10, 0x3, 0x3f}, 0x3c)

16:42:59 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  948.731630] bond0: Error: Device is in use and cannot be enslaved
[  948.815701] bond0: Error: Device is in use and cannot be enslaved
[  948.819154] encrypted_key: insufficient parameters specified
16:42:59 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x13, 0x10, 0x3, 0x3f}, 0x3c)

16:42:59 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

16:42:59 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:00 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

16:43:00 executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x13, 0x10, 0x3, 0x3f}, 0x3c)

16:43:01 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  950.538137] encrypted_key: insufficient parameters specified
16:43:01 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:01 executing program 2:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:01 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  951.205644] encrypted_key: insufficient parameters specified
[  951.335285] kauditd_printk_skb: 176 callbacks suppressed
[  951.335301] audit: type=1400 audit(1577724182.145:9444): avc:  denied  { map } for  pid=24341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:02 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

[  951.566191] audit: type=1400 audit(1577724182.155:9445): avc:  denied  { map } for  pid=24339 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:02 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

[  951.759162] audit: type=1400 audit(1577724182.155:9446): avc:  denied  { map } for  pid=24339 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  951.984510] audit: type=1400 audit(1577724182.205:9447): avc:  denied  { map } for  pid=24341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  952.245335] audit: type=1400 audit(1577724182.265:9448): avc:  denied  { map } for  pid=24341 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  952.401864] audit: type=1400 audit(1577724182.325:9449): avc:  denied  { map } for  pid=24341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  952.583715] audit: type=1400 audit(1577724182.325:9450): avc:  denied  { map } for  pid=24341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:03 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

[  952.745310] audit: type=1400 audit(1577724182.375:9451): avc:  denied  { map } for  pid=24341 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  952.839140] audit: audit_backlog=65 > audit_backlog_limit=64
[  952.845013] audit: audit_lost=48 audit_rate_limit=0 audit_backlog_limit=64
16:43:03 executing program 2:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:03 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

16:43:03 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10)
r1 = syz_open_procfs(0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xffffffff00000001, 0x2, 0x5}, 0x0, 0xf, r1, 0x0)
r2 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c)
connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e)
sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0)

[  953.297868] encrypted_key: insufficient parameters specified
[  953.370153] encrypted_key: insufficient parameters specified
16:43:04 executing program 3:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:05 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
getpgid(0xffffffffffffffff)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x40)
r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000540)=""/138)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00')
ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000480)=""/159)
readv(r3, 0x0, 0x0)
getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, 0x0, &(0x7f00000001c0))
write$sndseq(r2, &(0x7f0000000300)=[{0x81, 0x7, 0x7f, 0x1, @time={0x0, 0x989680}, {0x7, 0x5}, {0xd7, 0x4}, @connect={{0x6, 0x6}, {0x80}}}, {0x7, 0x7f, 0xb, 0x9, @tick, {0x0, 0xc0}, {0x0, 0x78}, @control={0x1, 0x4640, 0x7c}}, {0x16, 0x0, 0x0, 0x0, @tick, {0x3f, 0x81}, {0x1}, @note={0x7, 0x3, 0x0, 0xd4, 0x1}}, {0x1, 0x0, 0x1, 0x2, @tick=0x80, {0x0, 0x1f}, {0xc, 0xfa}, @result}, {0x7, 0x0, 0x0, 0x8, @time, {0x0, 0xde}, {0x3f}, @result={0x3}}, {0x0, 0x40, 0x46, 0x28, @tick=0x7, {0x8, 0x9}, {0x7f}, @connect={{0x7b}, {0x1f}}}, {0x7, 0x0, 0x7, 0x0, @tick, {}, {0x8, 0x14}, @time=@time={0x77359400}}], 0x150)
fallocate(r2, 0x0, 0x0, 0x1000f4)
ftruncate(r1, 0x8200)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x3, 0xe8000000, 0x0, 0x9}})
openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0)
r5 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$read(0xb, r5, &(0x7f0000000240)=""/112, 0x349b7f55)
r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="7370646174652064656661756c7420947365723a5c7472756474727588746564246c6f76007ebb1efa039737f2a94ce024142d550e127edf016912fa9b3640a2c80037bdcab0ef7cacdfbdc338122c01b0b697c2a1381df9508700a99c49beda923b218d7c48fbd724d3ebd6d7be9d240efbf58a39e864d61b4b2446319c03837dd26f000000000000"], 0x32, r6)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
r7 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0)

16:43:05 executing program 0:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:05 executing program 2:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:06 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port1\x00'})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85323, &(0x7f00000001c0)={{0x80}})

16:43:06 executing program 1:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:06 executing program 3:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

16:43:07 executing program 0:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0))
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000040)={{}, 0x15, 0x0, &(0x7f0000000240)="cf844eb715f6f8daafe155390c48f7115fb1874493"})
syncfs(0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xcec, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000001c00006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

[  956.282492] encrypted_key: insufficient parameters specified
[  956.378162] kauditd_printk_skb: 222 callbacks suppressed
[  956.378180] audit: type=1400 audit(1577724187.195:9673): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:07 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port1\x00'})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85323, &(0x7f00000001c0)={{0x80}})

[  956.522086] audit: type=1400 audit(1577724187.235:9674): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  956.748387] audit: type=1400 audit(1577724187.265:9675): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:07 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7da12a9bf3b3923b121d9c9e2cc98a6", 0x10)

16:43:07 executing program 2:
r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0)
ioctl$SIOCAX25ADDUID(r0, 0x541b, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}})

[  956.975352] audit: type=1400 audit(1577724187.275:9676): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  957.171268] audit: type=1400 audit(1577724187.295:9677): avc:  denied  { map } for  pid=24415 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  957.280782] audit: type=1400 audit(1577724187.295:9678): avc:  denied  { map } for  pid=24415 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  957.512574] audit: type=1400 audit(1577724187.315:9679): avc:  denied  { map } for  pid=24415 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:08 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port1\x00'})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85323, &(0x7f00000001c0)={{0x80}})

[  957.817328] audit: type=1400 audit(1577724187.315:9680): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  958.031932] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock
16:43:08 executing program 3:
socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0)
sendmsg$kcm(r1, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
close(0xffffffffffffffff)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r2, &(0x7f0000000340), 0x0}, 0x20)
recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3, 0x10, 0x1, 0x0, [], r3}, 0x415)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600)
write$cgroup_subtree(r4, 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0)
write$cgroup_subtree(r5, 0x0, 0x0)
pipe2(&(0x7f00000002c0), 0x86c00)
sendmsg$kcm(r1, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39)
write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d)
ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0)

[  958.121552] audit: type=1400 audit(1577724187.325:9681): avc:  denied  { map } for  pid=24415 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:09 executing program 2:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0)
read(r0, 0x0, 0x0)

[  958.380734] EXT4-fs (loop0): orphan cleanup on readonly fs
[  958.428497] audit: type=1400 audit(1577724187.335:9682): avc:  denied  { map } for  pid=24411 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  958.500910] EXT4-fs error (device loop0): ext4_orphan_get:1252: comm syz-executor.0: bad orphan inode 8
[  958.722389] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue
16:43:09 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0xc)
writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000b06050368fe07002b0000000e430a000300020045b300070300000319001a0012000200110001000600030000000000000000f769", 0x39}], 0x1)

16:43:09 executing program 0:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0))
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000040)={{}, 0x15, 0x0, &(0x7f0000000240)="cf844eb715f6f8daafe155390c48f7115fb1874493"})
syncfs(0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xcec, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000001c00006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:43:10 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port1\x00'})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85323, &(0x7f00000001c0)={{0x80}})

[  961.426431] kauditd_printk_skb: 131 callbacks suppressed
[  961.426448] audit: type=1400 audit(1577724192.245:9814): avc:  denied  { map } for  pid=24493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  961.636591] audit: type=1400 audit(1577724192.245:9815): avc:  denied  { map } for  pid=24493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  961.840424] audit: type=1400 audit(1577724192.635:9816): avc:  denied  { map } for  pid=24499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  962.025300] audit: type=1400 audit(1577724192.635:9817): avc:  denied  { map } for  pid=24499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  962.281363] audit: type=1400 audit(1577724192.725:9818): avc:  denied  { map } for  pid=24499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  962.570624] audit: type=1400 audit(1577724192.725:9819): avc:  denied  { map } for  pid=24499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:13 executing program 5:
bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000080)='\xd1|\x8c\x01\x01\xe0#/1\xf2`+\xef7\xbeu\xed\x89W\x9e\xb3=80\x17\xe3\xcb\x85\x96\xcb\xa3=', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0)
ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000000)={'eql\x00\a\x00\x00\x005\x00', @ifru_flags})

[  962.725297] audit: type=1400 audit(1577724192.785:9820): avc:  denied  { map } for  pid=24499 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:13 executing program 2:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0)
read(r0, 0x0, 0x0)

16:43:13 executing program 1:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:13 executing program 0:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0))
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000040)={{}, 0x15, 0x0, &(0x7f0000000240)="cf844eb715f6f8daafe155390c48f7115fb1874493"})
syncfs(0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xcec, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000001c00006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:43:13 executing program 3:
r0 = socket$l2tp(0x18, 0x1, 0x1)
setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x400000, 0x28d)

16:43:13 executing program 4:
ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000080)={0x0, @reserved})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
close(r0)

[  963.022749] audit: type=1400 audit(1577724192.825:9821): avc:  denied  { map } for  pid=24499 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  963.269497] audit: type=1400 audit(1577724192.825:9822): avc:  denied  { map } for  pid=24499 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:14 executing program 3:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:14 executing program 5:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

[  963.530853] audit: type=1400 audit(1577724192.885:9823): avc:  denied  { map } for  pid=24499 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:14 executing program 2:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0)
read(r0, 0x0, 0x0)

16:43:14 executing program 4:
ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000080)={0x0, @reserved})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
close(r0)

16:43:15 executing program 0:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0))
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8})
ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000040)={{}, 0x15, 0x0, &(0x7f0000000240)="cf844eb715f6f8daafe155390c48f7115fb1874493"})
syncfs(0xffffffffffffffff)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xcec, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000001c00006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:43:16 executing program 2:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0)
read(r0, 0x0, 0x0)

16:43:16 executing program 4:
ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000080)={0x0, @reserved})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
close(r0)

[  966.446666] kauditd_printk_skb: 87 callbacks suppressed
[  966.446683] audit: type=1400 audit(1577724197.265:9911): avc:  denied  { map } for  pid=24574 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  966.789802] audit: type=1400 audit(1577724197.275:9912): avc:  denied  { map } for  pid=24573 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:17 executing program 1:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:18 executing program 5:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

[  967.206133] audit: type=1400 audit(1577724197.295:9913): avc:  denied  { map } for  pid=24570 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:18 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

[  967.635349] audit: type=1400 audit(1577724197.325:9914): avc:  denied  { map } for  pid=24570 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:18 executing program 2:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

[  968.051576] audit: type=1400 audit(1577724197.335:9915): avc:  denied  { map } for  pid=24573 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:19 executing program 4:
ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000080)={0x0, @reserved})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
close(r0)

[  968.376289] audit: type=1804 audit(1577724197.345:9916): pid=24548 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir829993175/syzkaller.Er1435/78/file0" dev="sda1" ino=17482 res=1
[  968.716054] audit: type=1400 audit(1577724197.395:9917): avc:  denied  { map } for  pid=24574 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  968.974081] audit: type=1400 audit(1577724197.415:9918): avc:  denied  { map } for  pid=24573 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  969.171966] audit: audit_backlog=65 > audit_backlog_limit=64
[  969.261533] audit: audit_backlog=66 > audit_backlog_limit=64
[  971.535272] kauditd_printk_skb: 97 callbacks suppressed
[  971.535288] audit: type=1400 audit(1577724202.345:10007): avc:  denied  { map } for  pid=24616 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  971.935484] audit: type=1400 audit(1577724202.345:10008): avc:  denied  { map } for  pid=24616 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  972.121265] audit: type=1804 audit(1577724202.335:10006): pid=24594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir513138261/syzkaller.dnVNJL/247/file0" dev="sda1" ino=17276 res=1
[  972.477687] audit: type=1804 audit(1577724202.415:10009): pid=24612 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir773859160/syzkaller.casMX4/82/file0" dev="sda1" ino=17287 res=1
[  972.689685] audit: type=1400 audit(1577724202.485:10010): avc:  denied  { map } for  pid=24616 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  972.925390] audit: type=1400 audit(1577724202.485:10011): avc:  denied  { map } for  pid=24616 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  973.105867] audit: type=1400 audit(1577724203.865:10012): avc:  denied  { map } for  pid=24617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:24 executing program 3:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:24 executing program 5:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:24 executing program 4:
pipe2$9p(&(0x7f0000000080)={<r0=>0xffffffffffffffff}, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mISDNtimer\x00', 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

16:43:24 executing program 1:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:24 executing program 2:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:24 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

[  973.333908] audit: type=1400 audit(1577724203.895:10013): avc:  denied  { map } for  pid=24617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  973.679263] 9pnet: Insufficient options for proto=fd
[  973.702478] audit: type=1400 audit(1577724203.895:10014): avc:  denied  { map } for  pid=24617 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  973.979788] audit: type=1400 audit(1577724203.895:10015): avc:  denied  { map } for  pid=24617 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:24 executing program 4:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
sendmmsg$sock(r0, &(0x7f0000005340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0)
dup3(r0, 0xffffffffffffffff, 0x80000)
socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48)
exit(0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)

16:43:26 executing program 5:
syz_init_net_socket$bt_sco(0x1f, 0x5, 0x7)

16:43:27 executing program 0:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:27 executing program 4:
r0 = socket$l2tp(0x18, 0x1, 0x1)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
getsockopt$packet_buf(r0, 0x111, 0x0, 0x0, &(0x7f0000000100))

[  977.073348] kauditd_printk_skb: 85 callbacks suppressed
[  977.073365] audit: type=1400 audit(1577724207.885:10101): avc:  denied  { map } for  pid=24668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  977.353010] audit: type=1400 audit(1577724208.025:10102): avc:  denied  { map } for  pid=24668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  977.615282] audit: type=1400 audit(1577724208.025:10103): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  977.905287] audit: type=1400 audit(1577724208.025:10104): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  978.193903] audit: type=1400 audit(1577724208.105:10105): avc:  denied  { map } for  pid=24668 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  978.430000] audit: type=1400 audit(1577724208.215:10106): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:29 executing program 4:
r0 = socket$l2tp(0x18, 0x1, 0x1)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
getsockopt$packet_buf(r0, 0x111, 0x0, 0x0, &(0x7f0000000100))

[  978.715310] audit: type=1400 audit(1577724208.215:10107): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:29 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000804010002000270fff8", 0x39f}], 0x0, 0x0)

[  979.025282] audit: type=1400 audit(1577724208.345:10108): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  979.335325] audit: type=1400 audit(1577724208.345:10109): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  979.640835] audit: type=1400 audit(1577724208.455:10110): avc:  denied  { map } for  pid=24668 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  982.842693] kauditd_printk_skb: 47 callbacks suppressed
[  982.842708] audit: type=1400 audit(1577724213.655:10158): avc:  denied  { map } for  pid=24704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.045860] audit: type=1400 audit(1577724213.745:10159): avc:  denied  { map } for  pid=24704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.143284] audit: type=1400 audit(1577724213.745:10160): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.276474] audit: type=1400 audit(1577724213.745:10161): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.435303] audit: type=1400 audit(1577724213.785:10162): avc:  denied  { map } for  pid=24704 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.595275] audit: type=1400 audit(1577724213.845:10163): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  983.805301] audit: type=1400 audit(1577724213.845:10164): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  984.065331] audit: type=1400 audit(1577724213.915:10165): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  984.255927] audit: type=1400 audit(1577724213.915:10166): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  984.517527] audit: type=1400 audit(1577724213.985:10167): avc:  denied  { map } for  pid=24704 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:37 executing program 3:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:37 executing program 4:
r0 = socket$l2tp(0x18, 0x1, 0x1)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
getsockopt$packet_buf(r0, 0x111, 0x0, 0x0, &(0x7f0000000100))

16:43:37 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x100000000011, 0x2, 0x0)
bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0}, &(0x7f00000001c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @gretap={{0x10, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x44}}, 0x0)

[  987.864017] kauditd_printk_skb: 46 callbacks suppressed
[  987.864033] audit: type=1400 audit(1577724218.675:10214): avc:  denied  { map } for  pid=24758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  988.135317] audit: type=1400 audit(1577724218.775:10215): avc:  denied  { map } for  pid=24759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:39 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000804010002000270fff8", 0x39f}], 0x0, 0x0)

16:43:39 executing program 2:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa4eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, 0x0)
r2 = socket$bt_bnep(0x1f, 0x3, 0x4)
ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, 0x0)
r3 = creat(&(0x7f0000000000)='./file0\x00', 0x64)
write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0)
epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3)
write$P9_RAUTH(r3, &(0x7f0000000040)={0x14}, 0x14)
fallocate(r3, 0x20, 0x0, 0x7ff800000)
fallocate(r3, 0x8, 0x0, 0x8000)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=<r4=>0x0)
sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x5, 0x0, 0x3, 0x20, 0xe5, 0x0, 0x8a46}, 0x0)
r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0)
ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x15)
write(r5, &(0x7f0000000040)="e0", 0x100000098)
r6 = socket$inet6(0xa, 0x3, 0x42)
r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
setsockopt$bt_BT_VOICE(r8, 0x112, 0xb, &(0x7f0000000180), 0x2)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8)
connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r6, &(0x7f00000002c0), 0x4cc, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r6, 0x0, 0xd9, 0x0, 0x6})

16:43:39 executing program 4:
r0 = socket$l2tp(0x18, 0x1, 0x1)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
getsockopt$packet_buf(r0, 0x111, 0x0, 0x0, &(0x7f0000000100))

[  988.287288] audit: type=1400 audit(1577724218.775:10216): avc:  denied  { map } for  pid=24759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:39 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x100000000011, 0x2, 0x0)
bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0}, &(0x7f00000001c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @gretap={{0x10, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x44}}, 0x0)

16:43:39 executing program 1:
mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x802, 0x0)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0)

[  988.576459] audit: type=1400 audit(1577724218.775:10217): avc:  denied  { map } for  pid=24758 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  988.837525] audit: type=1400 audit(1577724218.805:10218): avc:  denied  { map } for  pid=24759 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  989.155312] audit: type=1400 audit(1577724218.825:10219): avc:  denied  { map } for  pid=24759 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:40 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@empty}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@empty}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x2, @in6=@remote}]}]}, 0x16c}}, 0x0)

[  989.389377] audit: type=1400 audit(1577724218.825:10220): avc:  denied  { map } for  pid=24758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  989.646657] audit: type=1400 audit(1577724218.865:10221): avc:  denied  { map } for  pid=24758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  989.883563] audit: type=1400 audit(1577724218.895:10222): avc:  denied  { map } for  pid=24759 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:40 executing program 1:
mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x802, 0x0)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0)

[  990.101265] audit: type=1400 audit(1577724218.925:10223): avc:  denied  { map } for  pid=24758 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:41 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000804010002000270fff8", 0x39f}], 0x0, 0x0)

16:43:41 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x100000000011, 0x2, 0x0)
bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0}, &(0x7f00000001c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @gretap={{0x10, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x44}}, 0x0)

[  992.980608] kauditd_printk_skb: 62 callbacks suppressed
[  992.980625] audit: type=1400 audit(1577724223.795:10286): avc:  denied  { map } for  pid=24825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  993.215274] audit: type=1400 audit(1577724223.795:10287): avc:  denied  { map } for  pid=24825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  993.480430] audit: type=1400 audit(1577724223.815:10288): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  993.745293] audit: type=1400 audit(1577724223.815:10289): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  993.953681] audit: type=1400 audit(1577724223.885:10290): avc:  denied  { map } for  pid=24825 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  994.141114] audit: type=1400 audit(1577724223.945:10291): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  994.241581] audit: type=1400 audit(1577724223.975:10292): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  994.387730] audit: type=1400 audit(1577724224.115:10293): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  994.652318] audit: type=1400 audit(1577724224.115:10294): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  994.782552] audit: type=1400 audit(1577724224.205:10295): avc:  denied  { map } for  pid=24825 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:48 executing program 1:
mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x802, 0x0)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0)

16:43:48 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@empty}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@empty}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x2, @in6=@remote}]}]}, 0x16c}}, 0x0)

16:43:48 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000804010002000270fff8", 0x39f}], 0x0, 0x0)

16:43:48 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x100000000011, 0x2, 0x0)
bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, <r2=>0x0}, &(0x7f00000001c0)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @gretap={{0x10, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x44}}, 0x0)

[  998.055028] kauditd_printk_skb: 109 callbacks suppressed
[  998.055045] audit: type=1400 audit(1577724228.865:10405): avc:  denied  { map } for  pid=24847 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  998.348339] audit: type=1400 audit(1577724228.915:10406): avc:  denied  { map } for  pid=24847 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:49 executing program 0:
pipe(&(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$inet(0x10, 0x2, 0x0)
syz_open_procfs(0x0, 0x0)
ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:43:49 executing program 3:
socket$netlink(0x10, 0x3, 0x0)
syz_genetlink_get_family_id$team(0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300))
epoll_create1(0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
bind$xdp(r1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0)

16:43:49 executing program 1:
mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x802, 0x0)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, 0x0)

16:43:49 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@empty}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@empty}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x2, @in6=@remote}]}]}, 0x16c}}, 0x0)

[  999.157251] audit: type=1400 audit(1577724229.975:10407): avc:  denied  { map } for  pid=24864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  999.336843] audit: type=1400 audit(1577724229.975:10408): avc:  denied  { map } for  pid=24864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[  999.556800] audit: type=1400 audit(1577724230.025:10410): avc:  denied  { map } for  pid=24864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:50 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, 0x0, &(0x7f0000000080))

[  999.804165] audit: type=1400 audit(1577724230.025:10411): avc:  denied  { map } for  pid=24864 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:50 executing program 2:
syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@show_sys_files_no='show_sys_files=no'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@dmask={'dmask'}}, {@fmask={'fmask'}}]})

16:43:50 executing program 4:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@empty}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@empty}, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote}, 0x2, @in6=@remote}]}]}, 0x16c}}, 0x0)

[ 1000.093740] audit: type=1400 audit(1577724230.015:10409): avc:  denied  { map } for  pid=24867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:51 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x24)

[ 1000.286924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1000.385319] audit: type=1400 audit(1577724230.105:10412): avc:  denied  { map } for  pid=24867 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1000.498567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1000.518864] ntfs: (device loop2): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1.
16:43:51 executing program 3:
socket$netlink(0x10, 0x3, 0x0)
syz_genetlink_get_family_id$team(0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300))
epoll_create1(0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
bind$xdp(r1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0)

16:43:51 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, 0x0, &(0x7f0000000080))

[ 1000.594105] audit: type=1400 audit(1577724230.105:10413): avc:  denied  { map } for  pid=24867 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1000.655000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1000.764769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
16:43:51 executing program 2:
syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@show_sys_files_no='show_sys_files=no'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@dmask={'dmask'}}, {@fmask={'fmask'}}]})

[ 1000.970509] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
16:43:51 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551", 0xde}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[ 1001.157977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1001.291308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1001.434757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1001.534253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
[ 1001.696959] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24886 comm=syz-executor.0
16:43:52 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000026000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000100)="360fae08670f05d10f040d0d0a4c2611b08e58e0e0a526660f388153000f320fc75ac70f019af5ffba21002466ededc79e9c5ebaa000ef", 0x37}], 0x1, 0x5c, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:43:52 executing program 4:
recvmmsg(0xffffffffffffffff, &(0x7f0000003680)=[{{0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000001d40)=""/253, 0xfd}], 0x1}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00')
preadv(r0, &(0x7f00000017c0), 0x19e, 0x0)

16:43:52 executing program 1:
r0 = getpid()
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0)
eventfd2(0xffff, 0x0)
pipe(&(0x7f0000000380))
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
perf_event_open(&(0x7f000001d000)={0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0}, 0x20)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
socket$unix(0x1, 0x2, 0x0)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x18d, 0x4}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x485f8fc7967aa369}}, 0x18)

16:43:52 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, 0x0, &(0x7f0000000080))

16:43:52 executing program 2:
syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@show_sys_files_no='show_sys_files=no'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@dmask={'dmask'}}, {@fmask={'fmask'}}]})

16:43:53 executing program 3:
socket$netlink(0x10, 0x3, 0x0)
syz_genetlink_get_family_id$team(0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300))
epoll_create1(0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
bind$xdp(r1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0)

16:43:53 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
socket$kcm(0x2b, 0x8000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newlink={0x110, 0x10, 0xe3b, 0x70bd2b, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0xe8, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xd8, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x15}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x22}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4={[], [], @broadcast}}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="a294d606d2787a6569ac9413dc59f136"}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}], @tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4={[], [], @loopback}}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8}, @IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x20}], @tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x27}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2}], @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x12}], @IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x110}}, 0x0)

[ 1003.101280] kauditd_printk_skb: 126 callbacks suppressed
[ 1003.101299] audit: type=1400 audit(1577724233.915:10535): avc:  denied  { map } for  pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1003.380131] audit: type=1400 audit(1577724233.915:10536): avc:  denied  { map } for  pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1003.617718] ntfs: (device loop2): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1.
[ 1003.635450] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size.
[ 1003.668023] audit: type=1400 audit(1577724234.055:10537): avc:  denied  { map } for  pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:54 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, 0x0, &(0x7f0000000080))

[ 1003.965295] audit: type=1400 audit(1577724234.055:10538): avc:  denied  { map } for  pid=24924 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:54 executing program 0:
socket$inet(0x10, 0x0, 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})
socket$inet_tcp(0x2, 0x1, 0x0)
syz_open_procfs(0x0, 0x0)
getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000240)=0xfffffffffffffe24)
syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x38, 0x2e8240)
r0 = syz_open_procfs(0x0, 0x0)
getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, &(0x7f0000000240))
accept$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$vcsa(0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, 0x0)
lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
eventfd(0x0)
close(0xffffffffffffffff)
sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000011000d04000000007643560000000062100000000000000000", @ANYRES32, @ANYBLOB="ecffff03000000ff"], 0x20}}, 0x0)

16:43:55 executing program 2:
syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@show_sys_files_no='show_sys_files=no'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@dmask={'dmask'}}, {@fmask={'fmask'}}]})

[ 1004.325295] audit: type=1400 audit(1577724234.485:10539): avc:  denied  { map } for  pid=24933 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1004.591931] audit: type=1400 audit(1577724234.515:10540): avc:  denied  { map } for  pid=24933 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1004.665560] netlink: 'syz-executor.4': attribute type 9 has an invalid length.
[ 1004.776106] netlink: 'syz-executor.4': attribute type 9 has an invalid length.
[ 1004.895368] netlink: 'syz-executor.4': attribute type 9 has an invalid length.
[ 1004.936293] audit: type=1400 audit(1577724234.535:10541): avc:  denied  { map } for  pid=24933 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1005.052128] netlink: 'syz-executor.4': attribute type 6 has an invalid length.
[ 1005.178646] netlink: 'syz-executor.4': attribute type 9 has an invalid length.
[ 1005.289855] audit: type=1400 audit(1577724234.565:10542): avc:  denied  { map } for  pid=24933 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:56 executing program 1:
r0 = getpid()
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0)
eventfd2(0xffff, 0x0)
pipe(&(0x7f0000000380))
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
perf_event_open(&(0x7f000001d000)={0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0}, 0x20)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
socket$unix(0x1, 0x2, 0x0)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x18d, 0x4}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x485f8fc7967aa369}}, 0x18)

16:43:56 executing program 3:
socket$netlink(0x10, 0x3, 0x0)
syz_genetlink_get_family_id$team(0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300))
epoll_create1(0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r2=>0x0})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0)
bind$xdp(r1, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0)

16:43:56 executing program 5:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x309, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000031000512d21e80648c6394fb0124fc00104c0b400c000200053582c137153e37090001802f236e040081", 0x2e}], 0x1, 0x0, 0x0, 0xe9610400}, 0x0)

16:43:56 executing program 4:
io_setup(0x14, &(0x7f0000000100)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000005, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x2})
io_submit(r0, 0x8, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xa}])

16:43:57 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6611, 0x0)

[ 1007.161568] netlink: 'syz-executor.5': attribute type 2 has an invalid length.
16:43:58 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {&(0x7f00000002c0)="64d7031a823b86", 0x7}], 0x2, 0x0)
r1 = socket$unix(0x1, 0x3, 0x0)
r2 = socket$unix(0x1, 0x10000000000002, 0x0)
bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8)
connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8)
recvmmsg(r2, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000002d, 0x2002, 0x0)
dup3(r1, r2, 0x0)
write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[], 0xf3)

16:43:59 executing program 1:
r0 = getpid()
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0)
eventfd2(0xffff, 0x0)
pipe(&(0x7f0000000380))
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
perf_event_open(&(0x7f000001d000)={0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0}, 0x20)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
socket$unix(0x1, 0x2, 0x0)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x18d, 0x4}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x485f8fc7967aa369}}, 0x18)

[ 1008.148201] kauditd_printk_skb: 148 callbacks suppressed
[ 1008.148219] audit: type=1400 audit(1577724238.965:10677): avc:  denied  { map } for  pid=24990 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:43:59 executing program 3:
r0 = inotify_init1(0x0)
fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3)
r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
dup2(r1, r0)

[ 1008.427311] audit: type=1400 audit(1577724239.015:10678): avc:  denied  { map } for  pid=24990 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1008.695313] audit: type=1400 audit(1577724239.015:10679): avc:  denied  { map } for  pid=24990 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1008.896629] audit: type=1400 audit(1577724239.105:10680): avc:  denied  { map } for  pid=24990 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1009.142736] audit: type=1400 audit(1577724239.285:10681): avc:  denied  { map } for  pid=24994 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1009.310185] audit: type=1400 audit(1577724239.285:10682): avc:  denied  { map } for  pid=24994 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1009.524344] audit: type=1400 audit(1577724239.285:10683): avc:  denied  { map } for  pid=24994 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1009.768744] audit: type=1400 audit(1577724239.285:10684): avc:  denied  { map } for  pid=24994 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1009.987262] audit: type=1400 audit(1577724239.435:10685): avc:  denied  { map } for  pid=24994 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1010.215274] audit: type=1400 audit(1577724239.435:10686): avc:  denied  { map } for  pid=24994 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1010.227075] team0 (unregistering): Port device team_slave_0 removed
[ 1010.981053] Restarting kernel threads ... done.
16:44:02 executing program 1:
r0 = getpid()
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0)
eventfd2(0xffff, 0x0)
pipe(&(0x7f0000000380))
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
perf_event_open(&(0x7f000001d000)={0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0}, 0x20)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
socket$unix(0x1, 0x2, 0x0)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x18d, 0x4}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x485f8fc7967aa369}}, 0x18)

[ 1011.456011] team0 (unregistering): Port device team_slave_1 removed
16:44:02 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000180))

16:44:02 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0)
unshare(0x200)
syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00\x16p\x88\xd2\xc6\x80\xbf7\x04k\xa8\x92\xa6\xf5\r7N#\f\x01\xdb\xea\x12\xb8\x8f\x81\xf9K\xea3\xf8b\xd9\x10\x9alz\x81^\x1ed%tji6\xefV\x8e\x1f \xa8\xab\x1e\x10\x1bb\xab\xdb\x84\xe0dw\xeb\xfb\xc0\xd4U\xc2)\xb6\xa7$\x1c\x88\x17\x8a{{\x9e;\xb4\xa0k\xce\xa5\x1ep\xf5\x01\xc9\xc9\xed 0>/vi\x1d\xc9\x98\'\xd3pk7\xb12\x1d)\xe7@\x1b~z\xf7\xe1f\xf2*E\x12\xa1\x0f\xf3\xe6\xd9^C\xf9\xbe=U\xf1hpX\xc8\xa1\xca\x99\x947v\x04\xe6\x18i*\x02O<&\x9d\x01\xaf\x04{\x06\xf6\xba\xbbGU\xf2\x00\x97\'\xef\xac ^\x84\xc35\t\x8e\xb8\xdf\x01\x00\x00\x00\x00\x00\x00\x00\xa3\x83\x1a\n_\x81\xce\x06\x93\xc6r$O\x99\x94OM\x01z6{\xf2<6\xa3\xbce\xd8\xb3U\xb8\xc69\xa28\xa6zD\xa6C\x11\xf6D\xac\xb9\x9cV\xc5n\x9a\xbc\x84I~3\x9a\xf1\x14\x87\x19\bJ\xe6\xf4\xb9_\xb3Z\xa0w\xe5\x97K\x97\x88\xc0\']\xab&\xb6\xc2\v\xaf\x06\xa8\xff\x02\x98o+\xb5\xe0\xc9L,\xfe/\x05(\xc4\x9f\x14f\xc8\x12\x9e\xa7\x06E\xea\xdc\xf2\x91jKVC\xe4\xed\x11\x933\xf1\r\xbf?Q\x14\xa1\xb3\x1b\xb6\xfb}\xe7s6+\xa4\x1e\xf8\xfb\x8e\xa1\xd6P\x03l\xb3\xe6\x03\xfa\x14\xca\xfej6T\xe7P')
mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$dupfd(r1, 0x0, r0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000040))
clone(0x78424100, 0x0, 0x0, 0x0, 0x0)

16:44:02 executing program 5:
r0 = socket$kcm(0x2, 0x2, 0x73)
r1 = socket$kcm(0x2, 0x2, 0x73)
bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10)
connect(r1, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10)

16:44:02 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x5, 0x0)
shutdown(r2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r2, 0x100000000000012)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000180)=0x10)

16:44:02 executing program 3:
r0 = inotify_init1(0x0)
fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3)
r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
dup2(r1, r0)

16:44:04 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'ip6gretap0\x00', 0x0})

[ 1013.182484] kauditd_printk_skb: 108 callbacks suppressed
[ 1013.182500] audit: type=1400 audit(1577724243.995:10795): avc:  denied  { map } for  pid=25031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:04 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000180))

[ 1013.383683] audit: type=1400 audit(1577724244.035:10796): avc:  denied  { map } for  pid=25028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:04 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x5, 0x0)
shutdown(r2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r2, 0x100000000000012)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000180)=0x10)

[ 1013.600630] audit: type=1400 audit(1577724244.035:10797): avc:  denied  { map } for  pid=25028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1013.842167] audit: type=1400 audit(1577724244.075:10798): avc:  denied  { map } for  pid=25031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1014.071121] audit: type=1400 audit(1577724244.075:10799): avc:  denied  { map } for  pid=25031 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1014.371908] audit: type=1400 audit(1577724244.075:10800): avc:  denied  { map } for  pid=25031 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1014.655304] audit: type=1400 audit(1577724244.075:10801): avc:  denied  { map } for  pid=25024 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:05 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'ip6gretap0\x00', 0x0})

[ 1014.893130] audit: type=1400 audit(1577724244.095:10802): avc:  denied  { map } for  pid=25028 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1015.026641] IPVS: ftp: loaded support on port[0] = 21
16:44:05 executing program 3:
r0 = inotify_init1(0x0)
fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3)
r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
dup2(r1, r0)

[ 1015.260100] audit: type=1400 audit(1577724244.135:10803): avc:  denied  { map } for  pid=25028 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:06 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&66\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x17\xdeM\x802\x1f\xa6\x8a\x89\x1c')
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:06 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000180))

[ 1015.558295] IPVS: ftp: loaded support on port[0] = 21
[ 1015.577508] audit: type=1400 audit(1577724244.145:10804): avc:  denied  { map } for  pid=25024 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:06 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x5, 0x0)
shutdown(r2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r2, 0x100000000000012)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000180)=0x10)

[ 1018.207498] kauditd_printk_skb: 117 callbacks suppressed
[ 1018.207514] audit: type=1400 audit(1577724249.025:10922): avc:  denied  { map } for  pid=25080 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1018.395303] audit: type=1400 audit(1577724249.115:10923): avc:  denied  { map } for  pid=25080 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1018.631301] audit: type=1400 audit(1577724249.115:10924): avc:  denied  { map } for  pid=25080 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1018.885316] audit: type=1400 audit(1577724249.295:10925): avc:  denied  { map } for  pid=25081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.035295] audit: type=1400 audit(1577724249.295:10926): avc:  denied  { map } for  pid=25081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.212867] audit: type=1400 audit(1577724249.295:10927): avc:  denied  { map } for  pid=25081 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.405337] audit: type=1400 audit(1577724249.295:10928): avc:  denied  { map } for  pid=25081 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.605273] audit: type=1400 audit(1577724249.395:10929): avc:  denied  { map } for  pid=25081 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.802111] audit: type=1400 audit(1577724249.485:10930): avc:  denied  { map } for  pid=25081 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1019.958156] audit: type=1400 audit(1577724249.605:10931): avc:  denied  { map } for  pid=25081 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1023.252591] kauditd_printk_skb: 58 callbacks suppressed
[ 1023.252608] audit: type=1400 audit(1577724254.065:10990): avc:  denied  { map } for  pid=25086 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.002340] audit: type=1400 audit(1577724254.815:10991): avc:  denied  { map } for  pid=25087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.155270] audit: type=1400 audit(1577724254.895:10992): avc:  denied  { map } for  pid=25087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.285273] audit: type=1400 audit(1577724254.895:10993): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.485300] audit: type=1400 audit(1577724254.895:10994): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.595926] audit: type=1400 audit(1577724254.935:10995): avc:  denied  { map } for  pid=25087 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.755803] audit: type=1400 audit(1577724255.015:10996): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1024.917149] audit: type=1400 audit(1577724255.015:10997): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1025.126450] audit: type=1400 audit(1577724255.065:10998): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1025.167817] audit: type=1400 audit(1577724255.065:10999): avc:  denied  { map } for  pid=25087 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:22 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0)
unshare(0x200)
syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00\x16p\x88\xd2\xc6\x80\xbf7\x04k\xa8\x92\xa6\xf5\r7N#\f\x01\xdb\xea\x12\xb8\x8f\x81\xf9K\xea3\xf8b\xd9\x10\x9alz\x81^\x1ed%tji6\xefV\x8e\x1f \xa8\xab\x1e\x10\x1bb\xab\xdb\x84\xe0dw\xeb\xfb\xc0\xd4U\xc2)\xb6\xa7$\x1c\x88\x17\x8a{{\x9e;\xb4\xa0k\xce\xa5\x1ep\xf5\x01\xc9\xc9\xed 0>/vi\x1d\xc9\x98\'\xd3pk7\xb12\x1d)\xe7@\x1b~z\xf7\xe1f\xf2*E\x12\xa1\x0f\xf3\xe6\xd9^C\xf9\xbe=U\xf1hpX\xc8\xa1\xca\x99\x947v\x04\xe6\x18i*\x02O<&\x9d\x01\xaf\x04{\x06\xf6\xba\xbbGU\xf2\x00\x97\'\xef\xac ^\x84\xc35\t\x8e\xb8\xdf\x01\x00\x00\x00\x00\x00\x00\x00\xa3\x83\x1a\n_\x81\xce\x06\x93\xc6r$O\x99\x94OM\x01z6{\xf2<6\xa3\xbce\xd8\xb3U\xb8\xc69\xa28\xa6zD\xa6C\x11\xf6D\xac\xb9\x9cV\xc5n\x9a\xbc\x84I~3\x9a\xf1\x14\x87\x19\bJ\xe6\xf4\xb9_\xb3Z\xa0w\xe5\x97K\x97\x88\xc0\']\xab&\xb6\xc2\v\xaf\x06\xa8\xff\x02\x98o+\xb5\xe0\xc9L,\xfe/\x05(\xc4\x9f\x14f\xc8\x12\x9e\xa7\x06E\xea\xdc\xf2\x91jKVC\xe4\xed\x11\x933\xf1\r\xbf?Q\x14\xa1\xb3\x1b\xb6\xfb}\xe7s6+\xa4\x1e\xf8\xfb\x8e\xa1\xd6P\x03l\xb3\xe6\x03\xfa\x14\xca\xfej6T\xe7P')
mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$dupfd(r1, 0x0, r0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000040))
clone(0x78424100, 0x0, 0x0, 0x0, 0x0)

16:44:22 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x5, 0x0)
shutdown(r2, 0x0)
bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c)
listen(r2, 0x100000000000012)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000180)=0x10)

16:44:22 executing program 3:
r0 = inotify_init1(0x0)
fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3)
r1 = memfd_create(&(0x7f00000000c0)='eth1\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
dup2(r1, r0)

16:44:22 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'ip6gretap0\x00', 0x0})

16:44:22 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000180))

16:44:22 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&66\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x17\xdeM\x802\x1f\xa6\x8a\x89\x1c')
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:22 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'ip6gretap0\x00', 0x0})

16:44:22 executing program 4:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0xffffff3a, 0x0, @remote, @local, {[], @icmpv6=@echo_reply}}}}}, 0x0)

16:44:22 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000120081aee4050c00000f78c9bed0ca68070c8ccb39f02366eb3000000000a3", 0x23}], 0x1}, 0x0)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:22 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&66\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x17\xdeM\x802\x1f\xa6\x8a\x89\x1c')
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

[ 1031.691934] kauditd_printk_skb: 13 callbacks suppressed
[ 1031.691951] audit: type=1400 audit(1577724262.505:11013): avc:  denied  { map } for  pid=25100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1031.875287] audit: type=1400 audit(1577724262.515:11014): avc:  denied  { map } for  pid=25100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1032.053908] audit: type=1400 audit(1577724262.525:11015): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:23 executing program 2:
perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00')
preadv(r0, &(0x7f00000017c0), 0x375, 0x0)

[ 1032.273196] audit: type=1400 audit(1577724262.535:11016): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:23 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r2, 0xfffffffffffffffd)
keyctl$chown(0x6, r2, 0x0, 0x0)

[ 1032.347797] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 1032.471757] audit: type=1400 audit(1577724262.565:11017): avc:  denied  { map } for  pid=25100 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1032.477817] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 1032.636863] audit: type=1400 audit(1577724262.595:11018): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1032.874666] audit: type=1400 audit(1577724262.595:11019): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1032.882140] IPVS: ftp: loaded support on port[0] = 21
[ 1033.059991] audit: type=1400 audit(1577724262.655:11020): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1033.332281] audit: type=1400 audit(1577724262.715:11021): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1033.550749] audit: type=1400 audit(1577724262.765:11022): avc:  denied  { map } for  pid=25100 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:25 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0)
unshare(0x200)
syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00\x16p\x88\xd2\xc6\x80\xbf7\x04k\xa8\x92\xa6\xf5\r7N#\f\x01\xdb\xea\x12\xb8\x8f\x81\xf9K\xea3\xf8b\xd9\x10\x9alz\x81^\x1ed%tji6\xefV\x8e\x1f \xa8\xab\x1e\x10\x1bb\xab\xdb\x84\xe0dw\xeb\xfb\xc0\xd4U\xc2)\xb6\xa7$\x1c\x88\x17\x8a{{\x9e;\xb4\xa0k\xce\xa5\x1ep\xf5\x01\xc9\xc9\xed 0>/vi\x1d\xc9\x98\'\xd3pk7\xb12\x1d)\xe7@\x1b~z\xf7\xe1f\xf2*E\x12\xa1\x0f\xf3\xe6\xd9^C\xf9\xbe=U\xf1hpX\xc8\xa1\xca\x99\x947v\x04\xe6\x18i*\x02O<&\x9d\x01\xaf\x04{\x06\xf6\xba\xbbGU\xf2\x00\x97\'\xef\xac ^\x84\xc35\t\x8e\xb8\xdf\x01\x00\x00\x00\x00\x00\x00\x00\xa3\x83\x1a\n_\x81\xce\x06\x93\xc6r$O\x99\x94OM\x01z6{\xf2<6\xa3\xbce\xd8\xb3U\xb8\xc69\xa28\xa6zD\xa6C\x11\xf6D\xac\xb9\x9cV\xc5n\x9a\xbc\x84I~3\x9a\xf1\x14\x87\x19\bJ\xe6\xf4\xb9_\xb3Z\xa0w\xe5\x97K\x97\x88\xc0\']\xab&\xb6\xc2\v\xaf\x06\xa8\xff\x02\x98o+\xb5\xe0\xc9L,\xfe/\x05(\xc4\x9f\x14f\xc8\x12\x9e\xa7\x06E\xea\xdc\xf2\x91jKVC\xe4\xed\x11\x933\xf1\r\xbf?Q\x14\xa1\xb3\x1b\xb6\xfb}\xe7s6+\xa4\x1e\xf8\xfb\x8e\xa1\xd6P\x03l\xb3\xe6\x03\xfa\x14\xca\xfej6T\xe7P')
mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$dupfd(r1, 0x0, r0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000040))
clone(0x78424100, 0x0, 0x0, 0x0, 0x0)

16:44:25 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000120081aee4050c00000f78c9bed0ca68070c8ccb39f02366eb3000000000a3", 0x23}], 0x1}, 0x0)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:25 executing program 4:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0xffffff3a, 0x0, @remote, @local, {[], @icmpv6=@echo_reply}}}}}, 0x0)

16:44:25 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x2b, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t&66\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x17\xdeM\x802\x1f\xa6\x8a\x89\x1c')
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:25 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c)
setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8)
close(r2)

16:44:25 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r2, 0xfffffffffffffffd)
keyctl$chown(0x6, r2, 0x0, 0x0)

16:44:25 executing program 4:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0xffffff3a, 0x0, @remote, @local, {[], @icmpv6=@echo_reply}}}}}, 0x0)

[ 1034.467063] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 1034.503425] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
16:44:25 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r2, 0xfffffffffffffffd)
keyctl$chown(0x6, r2, 0x0, 0x0)

16:44:25 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000120081aee4050c00000f78c9bed0ca68070c8ccb39f02366eb3000000000a3", 0x23}], 0x1}, 0x0)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:25 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c)
setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8)
close(r2)

16:44:25 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8000000})

16:44:26 executing program 4:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0xffffff3a, 0x0, @remote, @local, {[], @icmpv6=@echo_reply}}}}}, 0x0)

[ 1035.608069] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 1035.807297] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 1036.134018] IPVS: ftp: loaded support on port[0] = 21
[ 1036.699091] kauditd_printk_skb: 183 callbacks suppressed
[ 1036.699107] audit: type=1400 audit(1577724267.515:11206): avc:  denied  { map } for  pid=25168 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1036.923382] audit: type=1400 audit(1577724267.555:11207): avc:  denied  { map } for  pid=25169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.045288] audit: type=1400 audit(1577724267.555:11208): avc:  denied  { map } for  pid=25168 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.185446] audit: type=1400 audit(1577724267.555:11209): avc:  denied  { map } for  pid=25169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.315370] audit: type=1400 audit(1577724267.565:11210): avc:  denied  { map } for  pid=25167 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.410833] audit: type=1400 audit(1577724267.575:11211): avc:  denied  { map } for  pid=25169 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.528910] audit: type=1400 audit(1577724267.585:11212): avc:  denied  { map } for  pid=25169 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.610644] audit: type=1400 audit(1577724267.595:11213): avc:  denied  { map } for  pid=25168 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.675309] audit: type=1400 audit(1577724267.605:11214): avc:  denied  { map } for  pid=25167 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1037.745300] audit: type=1400 audit(1577724267.615:11215): avc:  denied  { map } for  pid=25167 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:31 executing program 0:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0)
unshare(0x200)
syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/mnt\x00\x16p\x88\xd2\xc6\x80\xbf7\x04k\xa8\x92\xa6\xf5\r7N#\f\x01\xdb\xea\x12\xb8\x8f\x81\xf9K\xea3\xf8b\xd9\x10\x9alz\x81^\x1ed%tji6\xefV\x8e\x1f \xa8\xab\x1e\x10\x1bb\xab\xdb\x84\xe0dw\xeb\xfb\xc0\xd4U\xc2)\xb6\xa7$\x1c\x88\x17\x8a{{\x9e;\xb4\xa0k\xce\xa5\x1ep\xf5\x01\xc9\xc9\xed 0>/vi\x1d\xc9\x98\'\xd3pk7\xb12\x1d)\xe7@\x1b~z\xf7\xe1f\xf2*E\x12\xa1\x0f\xf3\xe6\xd9^C\xf9\xbe=U\xf1hpX\xc8\xa1\xca\x99\x947v\x04\xe6\x18i*\x02O<&\x9d\x01\xaf\x04{\x06\xf6\xba\xbbGU\xf2\x00\x97\'\xef\xac ^\x84\xc35\t\x8e\xb8\xdf\x01\x00\x00\x00\x00\x00\x00\x00\xa3\x83\x1a\n_\x81\xce\x06\x93\xc6r$O\x99\x94OM\x01z6{\xf2<6\xa3\xbce\xd8\xb3U\xb8\xc69\xa28\xa6zD\xa6C\x11\xf6D\xac\xb9\x9cV\xc5n\x9a\xbc\x84I~3\x9a\xf1\x14\x87\x19\bJ\xe6\xf4\xb9_\xb3Z\xa0w\xe5\x97K\x97\x88\xc0\']\xab&\xb6\xc2\v\xaf\x06\xa8\xff\x02\x98o+\xb5\xe0\xc9L,\xfe/\x05(\xc4\x9f\x14f\xc8\x12\x9e\xa7\x06E\xea\xdc\xf2\x91jKVC\xe4\xed\x11\x933\xf1\r\xbf?Q\x14\xa1\xb3\x1b\xb6\xfb}\xe7s6+\xa4\x1e\xf8\xfb\x8e\xa1\xd6P\x03l\xb3\xe6\x03\xfa\x14\xca\xfej6T\xe7P')
mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$dupfd(r1, 0x0, r0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000040))
clone(0x78424100, 0x0, 0x0, 0x0, 0x0)

16:44:31 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r2, 0xfffffffffffffffd)
keyctl$chown(0x6, r2, 0x0, 0x0)

16:44:31 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c)
setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8)
close(r2)

16:44:31 executing program 3:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000120081aee4050c00000f78c9bed0ca68070c8ccb39f02366eb3000000000a3", 0x23}], 0x1}, 0x0)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

16:44:31 executing program 1:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

16:44:31 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0xa3, 0x4, 0x100000001, 0x0, r0}, 0x2c)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, 0x0}, 0x20)

[ 1040.608151] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
16:44:31 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\x02roup.stap\x00', 0x2761, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000)
write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)

[ 1040.684326] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
16:44:31 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={<r0=>0xffffffffffffffff})
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty, [], {@ipv4={0x800, {{0x2da, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4, 0x0, 0x0, 0x0, [{}, {}, {}]}]}}, @dccp={{0x0, 0x0, 0x40000153, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "a52d73", 0x0, '`51'}}}}}}, 0x0)

16:44:31 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c)
setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8)
close(r2)

[ 1040.979642] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:44:31 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
fallocate(r0, 0x3, 0xc002, 0x8020003)

[ 1041.208070] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:44:32 executing program 1:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

16:44:32 executing program 5:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

[ 1041.708194] kauditd_printk_skb: 65 callbacks suppressed
[ 1041.708211] audit: type=1400 audit(1577724272.525:11281): avc:  denied  { map } for  pid=25195 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1041.887362] audit: type=1400 audit(1577724272.525:11282): avc:  denied  { map } for  pid=25195 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.041238] audit: type=1400 audit(1577724272.525:11283): avc:  denied  { map } for  pid=25194 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.250492] audit: type=1400 audit(1577724272.555:11284): avc:  denied  { map } for  pid=25194 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.329119] IPVS: ftp: loaded support on port[0] = 21
[ 1042.435275] audit: type=1400 audit(1577724272.585:11285): avc:  denied  { map } for  pid=25195 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.527772] audit: type=1400 audit(1577724272.615:11286): avc:  denied  { map } for  pid=25194 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.620916] audit: type=1400 audit(1577724272.635:11287): avc:  denied  { map } for  pid=25194 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.778329] audit: type=1400 audit(1577724272.645:11288): avc:  denied  { map } for  pid=25195 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.863344] audit: type=1400 audit(1577724272.675:11289): avc:  denied  { map } for  pid=25195 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1042.972516] audit: type=1400 audit(1577724272.675:11290): avc:  denied  { map } for  pid=25195 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1043.282666] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[ 1046.776288] device bridge_slave_1 left promiscuous mode
[ 1046.781843] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1046.836515] device bridge_slave_0 left promiscuous mode
[ 1046.842063] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1051.827083] device hsr_slave_1 left promiscuous mode
[ 1051.868383] device hsr_slave_0 left promiscuous mode
[ 1051.908666] team0 (unregistering): Port device team_slave_1 removed
[ 1051.921557] team0 (unregistering): Port device team_slave_0 removed
[ 1051.931866] bond0 (unregistering): Releasing backup interface bond_slave_1
[ 1051.971699] bond0 (unregistering): Releasing backup interface bond_slave_0
[ 1052.045951] bond0 (unregistering): Released all slaves
16:44:44 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
fallocate(r0, 0x3, 0xc002, 0x8020003)

16:44:44 executing program 4:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0)
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))

16:44:44 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_int(r0, 0x1f00000000000000, 0x400000000000d1, &(0x7f0000000000)=0xa4ffffff, 0x4)

16:44:44 executing program 1:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

16:44:44 executing program 5:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

16:44:44 executing program 0:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:44:44 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_int(r0, 0x1f00000000000000, 0x400000000000d1, &(0x7f0000000000)=0xa4ffffff, 0x4)

16:44:44 executing program 4:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0)
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))

[ 1053.922905] kauditd_printk_skb: 52 callbacks suppressed
[ 1053.922920] audit: type=1400 audit(1577724284.735:11343): avc:  denied  { map } for  pid=25222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:44 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
fallocate(r0, 0x3, 0xc002, 0x8020003)

[ 1054.115307] audit: type=1400 audit(1577724284.775:11344): avc:  denied  { map } for  pid=25222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1054.245349] audit: type=1400 audit(1577724284.795:11345): avc:  denied  { map } for  pid=25222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1054.426192] audit: type=1400 audit(1577724284.795:11346): avc:  denied  { map } for  pid=25222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:45 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_int(r0, 0x1f00000000000000, 0x400000000000d1, &(0x7f0000000000)=0xa4ffffff, 0x4)

[ 1054.605320] audit: type=1400 audit(1577724284.855:11347): avc:  denied  { map } for  pid=25224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:45 executing program 0:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

[ 1054.762411] audit: type=1400 audit(1577724284.855:11348): avc:  denied  { map } for  pid=25224 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:45 executing program 4:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0)
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))

[ 1054.922885] audit: type=1400 audit(1577724284.855:11349): avc:  denied  { map } for  pid=25224 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1055.115752] audit: type=1400 audit(1577724284.865:11350): avc:  denied  { map } for  pid=25222 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1055.237701] audit: type=1400 audit(1577724284.865:11351): avc:  denied  { map } for  pid=25222 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1055.435584] audit: type=1400 audit(1577724284.905:11352): avc:  denied  { map } for  pid=25222 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:44:46 executing program 3:
r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0))
r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}])
fallocate(r0, 0x3, 0xc002, 0x8020003)

16:44:46 executing program 0:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:44:47 executing program 4:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0)
lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580))

[ 1057.887282] IPVS: ftp: loaded support on port[0] = 21
[ 1058.138062] IPVS: ftp: loaded support on port[0] = 21
[ 1058.760202] chnl_net:caif_netlink_parms(): no params data found
[ 1058.971475] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1058.978567] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1058.987397] device bridge_slave_0 entered promiscuous mode
[ 1059.110790] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1059.118329] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1059.125854] device bridge_slave_1 entered promiscuous mode
[ 1059.140690] chnl_net:caif_netlink_parms(): no params data found
[ 1059.166248] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 1059.179742] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 1059.264600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[ 1059.271958] team0: Port device team_slave_0 added
[ 1059.283931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[ 1059.292376] team0: Port device team_slave_1 added
[ 1059.318911] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1059.325475] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1059.332824] device bridge_slave_0 entered promiscuous mode
[ 1059.347597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[ 1059.397186] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1059.403592] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1059.413661] device bridge_slave_1 entered promiscuous mode
[ 1059.421800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[ 1059.557083] device hsr_slave_0 entered promiscuous mode
[ 1059.595525] device hsr_slave_1 entered promiscuous mode
[ 1059.647255] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 1059.655176] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[ 1059.717929] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[ 1059.726085] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 1059.828164] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[ 1059.838723] team0: Port device team_slave_0 added
[ 1059.849736] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[ 1059.857404] team0: Port device team_slave_1 added
[ 1059.867188] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[ 1059.882561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[ 1059.952334] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[ 1060.067616] device hsr_slave_0 entered promiscuous mode
[ 1060.105573] device hsr_slave_1 entered promiscuous mode
[ 1060.160327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[ 1060.218414] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[ 1060.235977] device bridge_slave_1 left promiscuous mode
[ 1060.241515] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1060.287317] device bridge_slave_0 left promiscuous mode
[ 1060.292823] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1063.606896] device hsr_slave_1 left promiscuous mode
[ 1063.670163] device hsr_slave_0 left promiscuous mode
[ 1063.718298] team0 (unregistering): Port device team_slave_1 removed
[ 1063.729628] team0 (unregistering): Port device team_slave_0 removed
[ 1063.740441] bond0 (unregistering): Releasing backup interface bond_slave_1
[ 1063.781481] bond0 (unregistering): Releasing backup interface bond_slave_0
[ 1063.861376] bond0 (unregistering): Released all slaves
[ 1063.979493] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[ 1064.248265] 8021q: adding VLAN 0 to HW filter on device bond0
[ 1064.299958] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[ 1064.333112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[ 1064.344494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 1064.357537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 1064.377050] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[ 1064.383171] 8021q: adding VLAN 0 to HW filter on device team0
[ 1064.397960] 8021q: adding VLAN 0 to HW filter on device bond0
[ 1064.418936] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[ 1064.431624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[ 1064.446752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 1064.454763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 1064.467091] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1064.473506] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1064.483767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[ 1064.496977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 1064.504232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 1064.514181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 1064.528859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[ 1064.552565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 1064.565987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 1064.573733] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1064.580147] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1064.595837] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[ 1064.601949] 8021q: adding VLAN 0 to HW filter on device team0
[ 1064.625344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[ 1064.632644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 1064.679656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[ 1064.687428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 1064.701126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 1064.709126] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1064.715532] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1064.738503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[ 1064.758693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 1064.774411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 1064.831542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[ 1064.842699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 1064.863676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 1064.874871] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1064.881293] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1064.895369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[ 1064.906632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 1064.914515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 1064.947010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[ 1064.954022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 1064.967481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 1064.977348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 1064.993228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[ 1065.013703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 1065.040224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[ 1065.053669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 1065.071660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 1065.093887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[ 1065.109282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 1065.134518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[ 1065.147489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 1065.155106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 1065.169211] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[ 1065.185457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 1065.201847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 1065.210343] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 1065.231560] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[ 1065.245690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 1065.253540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 1065.263966] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[ 1065.270379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 1065.297102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[ 1065.304345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 1065.318059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 1065.359178] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[ 1065.367705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[ 1065.377014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 1065.384763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 1065.414533] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[ 1065.421154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 1065.430592] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[ 1065.443390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 1065.461416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 1065.509450] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[ 1065.530688] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[ 1065.541593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 1065.553899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 1065.564044] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 1065.600460] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 1065.634203] kauditd_printk_skb: 173 callbacks suppressed
[ 1065.634221] audit: type=1400 audit(1577724296.445:11526): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1065.717982] audit: type=1400 audit(1577724296.445:11527): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1065.778861] audit: type=1400 audit(1577724296.445:11528): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1065.851056] audit: type=1400 audit(1577724296.455:11529): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1065.905642] audit: type=1400 audit(1577724296.455:11530): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1065.976551] audit: type=1400 audit(1577724296.455:11531): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1066.041541] audit: type=1400 audit(1577724296.455:11532): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1066.071103] audit: type=1400 audit(1577724296.485:11533): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1066.097398] audit: type=1400 audit(1577724296.485:11534): avc:  denied  { map } for  pid=25271 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1066.123592] audit: type=1400 audit(1577724296.575:11535): avc:  denied  { map } for  pid=25272 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1066.279733] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:44:57 executing program 1:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

[ 1067.029851] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
16:44:57 executing program 5:
r0 = socket$inet6(0xa, 0x100000003, 0x3a)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000002c0)='./file0\x00', 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000e9def3fdb9ab", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fchown(0xffffffffffffffff, 0x0, 0x0)
getegid()
openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001240)='/dev/hwrng\x00', 0x0, 0x0)
read$eventfd(r2, &(0x7f0000001280), 0x8)
ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000280)={0x2})
utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
nanosleep(&(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000004c0))
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c)

16:44:57 executing program 0:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:44:57 executing program 2:
r0 = socket$inet(0x2, 0x3, 0x2)
setsockopt$inet_int(r0, 0x1f00000000000000, 0x400000000000d1, &(0x7f0000000000)=0xa4ffffff, 0x4)

16:44:57 executing program 3:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:44:57 executing program 4:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @loopback, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0)

16:44:57 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0xb)
sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r5, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000140)=0x81, 0x4)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8)
setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0)
mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0)
prctl$PR_GET_KEEPCAPS(0x7)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080))
ftruncate(r6, 0x7fff)
sendfile(r2, r6, &(0x7f0000000180), 0x8000fffffffe)

16:44:58 executing program 4:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @loopback, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0)

16:44:58 executing program 0:
sync_file_range(0xffffffffffffffff, 0x4, 0xfffffffffffffffd, 0x0)

16:44:58 executing program 3:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:44:58 executing program 4:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @loopback, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0)

16:44:59 executing program 0:
sync_file_range(0xffffffffffffffff, 0x4, 0xfffffffffffffffd, 0x0)

16:44:59 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_interrupt={0x1, {}, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

16:45:00 executing program 0:
sync_file_range(0xffffffffffffffff, 0x4, 0xfffffffffffffffd, 0x0)

16:45:00 executing program 4:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @loopback, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0)

16:45:00 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_interrupt={0x1, {}, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

16:45:00 executing program 3:
pipe(&(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
getpid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$pppoe(0x18, 0x1, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))
connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e)
ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000040))
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1)
splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0)

16:45:01 executing program 0:
sync_file_range(0xffffffffffffffff, 0x4, 0xfffffffffffffffd, 0x0)

[ 1070.689019] kauditd_printk_skb: 153 callbacks suppressed
[ 1070.689038] audit: type=1400 audit(1577724301.505:11689): avc:  denied  { map } for  pid=25324 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1070.921069] audit: type=1400 audit(1577724301.565:11690): avc:  denied  { map } for  pid=25324 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1071.105681] audit: type=1400 audit(1577724301.595:11691): avc:  denied  { map } for  pid=25327 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.195473] audit: type=1400 audit(1577724301.595:11692): avc:  denied  { map } for  pid=25327 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.295318] audit: type=1400 audit(1577724301.595:11693): avc:  denied  { map } for  pid=25327 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.378916] audit: type=1400 audit(1577724301.595:11694): avc:  denied  { map } for  pid=25327 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.435318] audit: type=1400 audit(1577724301.605:11695): avc:  denied  { map } for  pid=25324 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1071.501762] audit: type=1400 audit(1577724301.635:11696): avc:  denied  { map } for  pid=25327 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.551609] audit: type=1400 audit(1577724301.665:11697): avc:  denied  { map } for  pid=25324 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1071.635373] audit: type=1400 audit(1577724301.675:11698): avc:  denied  { map } for  pid=25327 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1071.708318] IPVS: ftp: loaded support on port[0] = 21
[ 1072.042408] chnl_net:caif_netlink_parms(): no params data found
[ 1072.194016] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1072.200739] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1072.208327] device bridge_slave_0 entered promiscuous mode
[ 1072.327865] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1072.334303] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1072.341447] device bridge_slave_1 entered promiscuous mode
[ 1072.364936] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 1072.489889] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 1072.514326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[ 1072.521761] team0: Port device team_slave_0 added
[ 1072.528472] device bridge_slave_1 left promiscuous mode
[ 1072.533968] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1072.576413] device bridge_slave_0 left promiscuous mode
[ 1072.581960] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1075.956985] device hsr_slave_1 left promiscuous mode
[ 1075.998652] device hsr_slave_0 left promiscuous mode
[ 1076.058554] team0 (unregistering): Port device team_slave_1 removed
[ 1076.070614] team0 (unregistering): Port device team_slave_0 removed
[ 1076.080945] bond0 (unregistering): Releasing backup interface bond_slave_1
[ 1076.111407] bond0 (unregistering): Releasing backup interface bond_slave_0
[ 1076.229050] bond0 (unregistering): Released all slaves
[ 1076.261400] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[ 1076.269808] team0: Port device team_slave_1 added
[ 1076.281277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[ 1076.292007] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[ 1076.358463] device hsr_slave_0 entered promiscuous mode
[ 1076.415772] device hsr_slave_1 entered promiscuous mode
[ 1076.470150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[ 1076.497222] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[ 1076.600560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[ 1076.865087] 8021q: adding VLAN 0 to HW filter on device bond0
[ 1076.900674] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[ 1076.934825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[ 1076.944556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 1076.963716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 1076.992346] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[ 1077.002816] 8021q: adding VLAN 0 to HW filter on device team0
[ 1077.034507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[ 1077.047928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 1077.065165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 1077.080958] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1077.087401] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1077.113395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[ 1077.126911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 1077.141550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 1077.154701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 1077.173231] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1077.179694] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1077.203417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[ 1077.217067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 1077.256573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[ 1077.263488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 1077.302439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[ 1077.311909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 1077.334294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 1077.362625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[ 1077.374545] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 1077.384508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 1077.394230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 1077.414081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[ 1077.420964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 1077.435502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 1077.455976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[ 1077.463072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 1077.472308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 1077.488021] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[ 1077.494227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 1077.531632] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[ 1077.544049] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[ 1077.550402] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 1077.557671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 1077.591449] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 1077.622247] kauditd_printk_skb: 45 callbacks suppressed
[ 1077.622264] audit: type=1400 audit(1577724308.435:11744): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.675311] audit: type=1400 audit(1577724308.435:11745): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.701560] audit: type=1400 audit(1577724308.445:11746): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.734305] audit: type=1400 audit(1577724308.445:11747): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.764370] audit: type=1400 audit(1577724308.455:11748): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.795462] audit: type=1400 audit(1577724308.465:11749): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.835561] audit: type=1400 audit(1577724308.465:11750): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.861778] audit: type=1400 audit(1577724308.475:11751): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.888754] audit: type=1400 audit(1577724308.475:11752): avc:  denied  { map } for  pid=25336 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1077.915387] audit: type=1400 audit(1577724308.515:11753): avc:  denied  { map } for  pid=25337 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1078.450610] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
16:45:09 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0xb)
sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r5, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000140)=0x81, 0x4)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8)
setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0)
mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0)
prctl$PR_GET_KEEPCAPS(0x7)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080))
ftruncate(r6, 0x7fff)
sendfile(r2, r6, &(0x7f0000000180), 0x8000fffffffe)

16:45:09 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x12, @u32}]}, 0x1c}}, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r2, 0x0, r4, 0x0, 0x80000000, 0x0)

16:45:09 executing program 5:
r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [<r1=>0x0]}, &(0x7f000095dffc)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000000080)=0x20)

16:45:09 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_interrupt={0x1, {}, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

16:45:09 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000421, 0x1)
write(r0, &(0x7f0000000340)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0)
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00')

16:45:09 executing program 0:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

16:45:10 executing program 2:
r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1)
ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_interrupt={0x1, {}, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

[ 1079.071688] IPVS: ftp: loaded support on port[0] = 21
[ 1079.225747] netlink: 'syz-executor.4': attribute type 18 has an invalid length.
16:45:10 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000421, 0x1)
write(r0, &(0x7f0000000340)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0)
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00')

16:45:11 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x12, @u32}]}, 0x1c}}, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r2, 0x0, r4, 0x0, 0x80000000, 0x0)

16:45:11 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_emit_ethernet(0x4a, &(0x7f00000003c0)={@local, @link_local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "008000", 0xf, 0xffffff11, 0x0, @remote, @ipv4={[], [], @multicast1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'HBq', 0x0, "a92008"}}}}}}}, 0x0)

16:45:11 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0xb)
sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r5, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000140)=0x81, 0x4)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8)
setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0)
mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0)
prctl$PR_GET_KEEPCAPS(0x7)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080))
ftruncate(r6, 0x7fff)
sendfile(r2, r6, &(0x7f0000000180), 0x8000fffffffe)

16:45:11 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000421, 0x1)
write(r0, &(0x7f0000000340)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0)
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00')

[ 1081.460112] netlink: 'syz-executor.4': attribute type 18 has an invalid length.
16:45:12 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', <r3=>0x0})
sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10)

16:45:12 executing program 3:
r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
fallocate(r0, 0x0, 0x2000421, 0x1)
write(r0, &(0x7f0000000340)='/', 0x1)
sendfile(r0, r0, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0)
symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00')

[ 1082.648814] kauditd_printk_skb: 246 callbacks suppressed
[ 1082.648832] audit: type=1400 audit(1577724313.405:12000): avc:  denied  { map } for  pid=25400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1082.694627] audit: type=1400 audit(1577724313.405:12001): avc:  denied  { map } for  pid=25400 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1082.719466] audit: type=1400 audit(1577724313.435:12002): avc:  denied  { read } for  pid=25398 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 1082.743678] audit: type=1400 audit(1577724313.545:12003): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1082.811448] audit: type=1400 audit(1577724313.625:12004): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1082.970658] audit: type=1400 audit(1577724313.705:12005): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1083.095417] audit: type=1400 audit(1577724313.765:12006): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1083.235392] audit: type=1400 audit(1577724313.835:12007): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1083.345294] audit: type=1400 audit(1577724313.885:12009): avc:  denied  { map } for  pid=25403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1083.405339] audit: type=1400 audit(1577724313.875:12008): avc:  denied  { map } for  pid=25397 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16784 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[ 1083.746528] IPVS: ftp: loaded support on port[0] = 21
[ 1084.211544] chnl_net:caif_netlink_parms(): no params data found
[ 1084.387179] device bridge_slave_1 left promiscuous mode
[ 1084.392713] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1084.447625] device bridge_slave_0 left promiscuous mode
[ 1084.453294] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1087.667025] device hsr_slave_1 left promiscuous mode
[ 1087.728471] device hsr_slave_0 left promiscuous mode
[ 1087.768522] team0 (unregistering): Port device team_slave_1 removed
[ 1087.780749] team0 (unregistering): Port device team_slave_0 removed
[ 1087.791082] bond0 (unregistering): Releasing backup interface bond_slave_1
[ 1087.821963] bond0 (unregistering): Releasing backup interface bond_slave_0
[ 1087.889011] bond0 (unregistering): Released all slaves
[ 1087.928379] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1087.934786] bridge0: port 1(bridge_slave_0) entered disabled state
[ 1087.942671] device bridge_slave_0 entered promiscuous mode
[ 1087.952136] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1087.958831] bridge0: port 2(bridge_slave_1) entered disabled state
[ 1087.966194] device bridge_slave_1 entered promiscuous mode
[ 1087.991981] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 1088.003795] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 1088.029544] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[ 1088.036994] team0: Port device team_slave_0 added
[ 1088.044812] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[ 1088.052507] team0: Port device team_slave_1 added
[ 1088.060187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[ 1088.126022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[ 1088.208448] device hsr_slave_0 entered promiscuous mode
[ 1088.255661] device hsr_slave_1 entered promiscuous mode
[ 1088.310254] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[ 1088.329197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[ 1088.412650] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[ 1088.662113] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[ 1088.668572] 8021q: adding VLAN 0 to HW filter on device bond0
[ 1088.703021] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[ 1088.727615] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[ 1088.734537] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 1088.749314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 1088.763683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 1088.782471] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[ 1088.789212] 8021q: adding VLAN 0 to HW filter on device team0
[ 1088.812278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[ 1088.827774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 1088.845918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 1088.853630] bridge0: port 1(bridge_slave_0) entered blocking state
[ 1088.860032] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 1088.868291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 1088.888036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[ 1088.895115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 1088.913371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 1088.924536] bridge0: port 2(bridge_slave_1) entered blocking state
[ 1088.930954] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 1088.971880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[ 1088.978913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 1089.003617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[ 1089.011128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 1089.025100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 1089.034503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 1089.049176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[ 1089.056206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 1089.064044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 1089.083710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[ 1089.090789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 1089.100519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 1089.121163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[ 1089.128060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 1089.142077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 1089.162579] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[ 1089.168935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 1089.214153] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[ 1089.226967] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[ 1089.233236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 1089.240651] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 1089.274860] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 1089.501112] kauditd_printk_skb: 39 callbacks suppressed
[ 1089.501130] audit: type=1400 audit(1577724320.315:12049): avc:  denied  { map } for  pid=25409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.555373] audit: type=1400 audit(1577724320.345:12050): avc:  denied  { map } for  pid=25409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.605348] audit: type=1400 audit(1577724320.355:12051): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.634829] audit: type=1400 audit(1577724320.355:12052): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.665137] audit: type=1400 audit(1577724320.365:12053): avc:  denied  { map } for  pid=25409 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.695339] audit: type=1400 audit(1577724320.365:12054): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.726585] audit: type=1400 audit(1577724320.395:12055): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.752863] audit: type=1400 audit(1577724320.405:12056): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.777548] audit: type=1400 audit(1577724320.405:12057): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1089.801754] audit: type=1400 audit(1577724320.415:12058): avc:  denied  { map } for  pid=25409 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:21 executing program 5:
r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [<r1=>0x0]}, &(0x7f000095dffc)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000000080)=0x20)

16:45:21 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x12, @u32}]}, 0x1c}}, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r2, 0x0, r4, 0x0, 0x80000000, 0x0)

16:45:21 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0xb)
sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
open$dir(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = fcntl$dupfd(r4, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r5, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000341000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000140)=0x81, 0x4)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8)
setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0)
mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0)
prctl$PR_GET_KEEPCAPS(0x7)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080))
ftruncate(r6, 0x7fff)
sendfile(r2, r6, &(0x7f0000000180), 0x8000fffffffe)

16:45:21 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text64={0x40, &(0x7f0000000180)="440f20c03505000000440f22c066b812000f00d8f040fe0e0f01bb0e0000000f20c035100000000f22c00f20c035010000000f22c0c7442400b0000000c744240200400000ff2c24b8e35d2f8aef66bafc0cecc46269a94a000fc75d80b9680900000f32", 0x64}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)

16:45:21 executing program 0:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

16:45:21 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', <r3=>0x0})
sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10)

16:45:21 executing program 3:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

[ 1090.602508] netlink: 'syz-executor.4': attribute type 18 has an invalid length.
[ 1090.772741] IPVS: ftp: loaded support on port[0] = 21
16:45:21 executing program 0:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

16:45:22 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', <r3=>0x0})
sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10)

16:45:22 executing program 1:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0'])
chdir(&(0x7f00000002c0)='./bus\x00')
r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x133)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
sendfile(r1, r1, 0x0, 0xa198)

16:45:22 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0x12, @u32}]}, 0x1c}}, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r2, 0x0, r4, 0x0, 0x80000000, 0x0)

[ 1091.780021] IPVS: ftp: loaded support on port[0] = 21
[ 1091.834744] IPVS: ftp: loaded support on port[0] = 21
16:45:22 executing program 0:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

16:45:23 executing program 5:
r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [<r1=>0x0]}, &(0x7f000095dffc)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000000080)=0x20)

16:45:23 executing program 3:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

[ 1092.657912] netlink: 'syz-executor.4': attribute type 18 has an invalid length.
[ 1093.042180] overlayfs: failed to resolve './bus': -2
[ 1093.117189] IPVS: ftp: loaded support on port[0] = 21
16:45:24 executing program 3:
socket$inet(0x2, 0x4000000000000001, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
r2 = dup(0xffffffffffffffff)
write$UHID_CREATE2(r2, &(0x7f0000000340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd, 0x1, 0xffffff6a, 0x7, 0x8, 0x0, "38d5a9630e05830aa9e85e61e7"}}, 0x125)
getpid()
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
fcntl$setpipe(r4, 0x407, 0x0)
creat(0x0, 0x0)
write(r4, &(0x7f0000000340), 0x41395527)
vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x4)
clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00')
pipe(&(0x7f00000002c0)={<r6=>0xffffffffffffffff})
r7 = socket$inet_udp(0x2, 0x2, 0x0)
close(r7)
splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0)
ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="d34e57fdf1c304fd22e961486ad18669d10000000400000000f90000", @ANYBLOB="00000000000000000100"/21, @ANYRES32=r4, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="00000000e632f0e20000000000000000000000366d0bc2cf00000000df11f2041a1b63e527080d750ec73e320d643305ffb4326c733913f9590dd73260661df4b82829ea03fc313e9de513f612492a7f427ff12ede499ecc1f1b9d74ff6ad964f97a0e9ecd4b02a7a22380f6b03d7a7be9f92b7f51fe02ef0fd09fe1e8f0c0ce0c8e841dc70b8c7fc9e39adc4169a3f8c842d50b8f9b8daa39c8043699e7e8f85a6d735c05e1731dcfbce43e"])
r8 = syz_open_dev$tty20(0xc, 0x4, 0x0)
ioctl$KDSKBENT(r8, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x7ff})
setsockopt$packet_buf(r5, 0x107, 0x2, 0x0, 0x0)

[ 1093.600749] IPVS: ftp: loaded support on port[0] = 21
[ 1093.709424] overlayfs: './file0' not a directory
16:45:24 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

16:45:24 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', <r3=>0x0})
sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10)

16:45:24 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(0x0)
r0 = socket$inet6(0xa, 0x2, 0x88)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xf401)

16:45:24 executing program 1:
mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6001, 0x0)
r0 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$BLKBSZSET(r0, 0x1261, 0x0)

16:45:25 executing program 5:
r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [<r1=>0x0]}, &(0x7f000095dffc)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000000080)=0x20)

[ 1094.397370] IPVS: ftp: loaded support on port[0] = 21
[ 1094.524440] kauditd_printk_skb: 155 callbacks suppressed
[ 1094.530049] audit: type=1400 audit(1577724325.325:12214): avc:  denied  { map } for  pid=25492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1094.642238] audit: type=1400 audit(1577724325.455:12215): avc:  denied  { map } for  pid=25492 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1094.748427] audit: type=1400 audit(1577724325.525:12216): avc:  denied  { map } for  pid=25492 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:25 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00', 0x2})
ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000080))

16:45:25 executing program 3:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

[ 1095.008398] audit: type=1400 audit(1577724325.555:12217): avc:  denied  { map } for  pid=25492 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1095.231407] audit: type=1400 audit(1577724325.555:12218): avc:  denied  { map } for  pid=25492 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1095.435811] audit: type=1400 audit(1577724325.765:12219): avc:  denied  { map } for  pid=25507 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1095.591428] audit: type=1400 audit(1577724325.765:12220): avc:  denied  { map } for  pid=25507 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:26 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

[ 1095.754744] audit: type=1400 audit(1577724325.815:12221): avc:  denied  { map } for  pid=25507 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:26 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

[ 1095.972388] audit: type=1400 audit(1577724325.815:12222): avc:  denied  { map } for  pid=25507 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:26 executing program 1:
creat(&(0x7f0000000700)='./bus\x00', 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0x3)
ioctl$FIONREAD(r1, 0x80047456, &(0x7f0000000000))

[ 1096.184773] audit: type=1400 audit(1577724325.855:12223): avc:  denied  { map } for  pid=25508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:27 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
splice(0xffffffffffffffff, &(0x7f0000000000)=0xfffe000000000, 0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:45:27 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00', 0x2})
ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000080))

16:45:27 executing program 3:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

16:45:28 executing program 1:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

16:45:28 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0)
pkey_alloc(0x0, 0x0)
ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000002340))
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3)
write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(r0, 0x5501)

16:45:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

16:45:28 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

16:45:28 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00', 0x2})
ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000080))

16:45:29 executing program 3:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

16:45:29 executing program 5:
syz_emit_ethernet(0x2b, &(0x7f0000000180)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @dev={0xac, 0x14, 0x14, 0x13}}, @icmp=@echo={0x8, 0x0, 0x0, 0x0, 0x0, "04"}}}}}, 0x0)

16:45:29 executing program 1:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

16:45:29 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\x06\x00', 0x2})
ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000080))

16:45:30 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

16:45:30 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10)
recvfrom$netrom(r0, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x3c5)
r1 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10)
sendmmsg(r1, &(0x7f0000000b80), 0x40000000000006b, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d409e995ce54c52d7c08eee0137cbee32a580a4b1d3e1aa68c09960ff6c920c6d637ba9057ee30a252b9497d541459ec31a26ca9b16bd9c37932d5c5d514eff31b2dd791d4f5061c9be026c6fc8557e8aaf3faa6fc3aaea3277ac28d146f39fc15"], 0x61)

[ 1099.531257] kauditd_printk_skb: 136 callbacks suppressed
[ 1099.531274] audit: type=1400 audit(1577724330.345:12360): avc:  denied  { map } for  pid=25576 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1099.733988] audit: type=1400 audit(1577724330.345:12361): avc:  denied  { map } for  pid=25576 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1099.937620] audit: type=1400 audit(1577724330.375:12362): avc:  denied  { map } for  pid=25575 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:30 executing program 5:
syz_emit_ethernet(0x2b, &(0x7f0000000180)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @dev={0xac, 0x14, 0x14, 0x13}}, @icmp=@echo={0x8, 0x0, 0x0, 0x0, 0x0, "04"}}}}}, 0x0)

16:45:30 executing program 4:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000280)=0x5, 0x4)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)

[ 1100.149669] audit: type=1400 audit(1577724330.375:12363): avc:  denied  { map } for  pid=25575 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:31 executing program 3:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

[ 1100.277968] audit: type=1400 audit(1577724330.395:12364): avc:  denied  { map } for  pid=25576 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:31 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100))

[ 1100.468904] audit: type=1400 audit(1577724330.395:12365): avc:  denied  { map } for  pid=25576 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1100.649658] audit: type=1400 audit(1577724330.455:12366): avc:  denied  { map } for  pid=25575 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1100.818867] audit: type=1400 audit(1577724330.455:12367): avc:  denied  { map } for  pid=25575 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:31 executing program 1:
ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r0 = socket$nl_route(0x10, 0x3, 0x0)
dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0x3, 0x2, 0x0, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_buf(r3, 0x29, 0x0, 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0)
open(0x0, 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r4, 0x7fff)
sendfile(r2, r4, 0x0, 0x8000fffffffe)

16:45:31 executing program 5:
syz_emit_ethernet(0x2b, &(0x7f0000000180)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @dev={0xac, 0x14, 0x14, 0x13}}, @icmp=@echo={0x8, 0x0, 0x0, 0x0, 0x0, "04"}}}}}, 0x0)

[ 1100.918581] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[ 1101.005287] audit: type=1400 audit(1577724330.475:12368): avc:  denied  { map } for  pid=25576 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:31 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff0", 0x16}], 0x0, 0x0)

[ 1101.116299] audit: type=1400 audit(1577724330.505:12369): avc:  denied  { map } for  pid=25576 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:32 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100))

16:45:32 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$lock(r3, 0x7, &(0x7f0000002000))
fcntl$lock(r3, 0x26, &(0x7f0000000100))
fcntl$lock(r3, 0x26, &(0x7f0000000180)={0x40001, 0x0, 0x2})
dup3(r2, r3, 0x0)

16:45:32 executing program 5:
syz_emit_ethernet(0x2b, &(0x7f0000000180)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @dev={0xac, 0x14, 0x14, 0x13}}, @icmp=@echo={0x8, 0x0, 0x0, 0x0, 0x0, "04"}}}}}, 0x0)

16:45:33 executing program 3:
ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000080))
socket(0x15, 0x80005, 0x0)
r0 = socket(0x0, 0x80005, 0x0)
getsockopt(r0, 0x0, 0x2714, 0xffffffffffffffff, &(0x7f0000000040))
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, &(0x7f0000000280))
getsockopt(0xffffffffffffffff, 0x0, 0x2714, 0xffffffffffffffff, &(0x7f0000000040))
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f0000000200)='memory.high\x00', 0x2, 0x0)
write$cgroup_int(r2, 0x0, 0x0)

16:45:33 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff0", 0x16}], 0x0, 0x0)

16:45:33 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff)
ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0)

16:45:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100))

16:45:33 executing program 2:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
syz_open_procfs(0xffffffffffffffff, 0x0)
pipe(&(0x7f00000005c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write(r4, &(0x7f0000000140)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f6273ef2aace367c13b8e834788d7da2d60077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db50189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d37792053e2b77cc86279ea843600"/297, 0x3accf8d5)
ptrace(0x4206, r3)
tkill(r3, 0x800000009)

16:45:34 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet(0x2, 0x1, 0x0)
setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000000)={'\x00', 0x7, 0x4, 0x3e0, 0x0, 0x0, 0x110, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@random="eb91b495a4fd", @multicast2, @multicast2, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x8001}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x430)

16:45:34 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100))

16:45:34 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff0", 0x16}], 0x0, 0x0)

16:45:34 executing program 3:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

16:45:34 executing program 2:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
syz_open_procfs(0xffffffffffffffff, 0x0)
pipe(&(0x7f00000005c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write(r4, &(0x7f0000000140)="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"/297, 0x3accf8d5)
ptrace(0x4206, r3)
tkill(r3, 0x800000009)

16:45:35 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x26a}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x48}}, 0x0)

16:45:35 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

[ 1104.719848] kauditd_printk_skb: 159 callbacks suppressed
[ 1104.719865] audit: type=1400 audit(1577724335.535:12529): avc:  denied  { map } for  pid=25666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1104.861374] audit: type=1400 audit(1577724335.545:12530): avc:  denied  { map } for  pid=25666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1105.005346] protocol 88fb is buggy, dev hsr_slave_0
[ 1105.010524] protocol 88fb is buggy, dev hsr_slave_1
[ 1105.062013] audit: type=1400 audit(1577724335.555:12531): avc:  denied  { map } for  pid=25666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:36 executing program 2:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
syz_open_procfs(0xffffffffffffffff, 0x0)
pipe(&(0x7f00000005c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write(r4, &(0x7f0000000140)="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"/297, 0x3accf8d5)
ptrace(0x4206, r3)
tkill(r3, 0x800000009)

16:45:36 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff0", 0x16}], 0x0, 0x0)

[ 1105.257077] audit: type=1400 audit(1577724335.565:12532): avc:  denied  { map } for  pid=25666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1105.416363] audit: type=1400 audit(1577724335.615:12533): avc:  denied  { map } for  pid=25666 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1105.608092] audit: type=1400 audit(1577724335.675:12534): avc:  denied  { map } for  pid=25666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1105.782378] audit: type=1400 audit(1577724335.705:12535): avc:  denied  { map } for  pid=25666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1105.980990] audit: type=1400 audit(1577724335.715:12536): avc:  denied  { map } for  pid=25671 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1106.031745] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1106.103124] audit: audit_backlog=65 > audit_backlog_limit=64
16:45:37 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

16:45:37 executing program 3:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

16:45:37 executing program 5:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00')
sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0)

16:45:37 executing program 2:
r0 = socket$unix(0x1, 0x1, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = dup2(r1, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = gettid()
syz_open_procfs(0xffffffffffffffff, 0x0)
pipe(&(0x7f00000005c0)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write(r4, &(0x7f0000000140)="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"/297, 0x3accf8d5)
ptrace(0x4206, r3)
tkill(r3, 0x800000009)

16:45:37 executing program 4:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

16:45:37 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

16:45:38 executing program 2:
perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil)
r0 = epoll_create1(0x0)
r1 = epoll_create1(0x0)
r2 = timerfd_create(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011})
r3 = socket$inet6(0xa, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040))
timerfd_settime(r2, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0)
epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x2a9)
r4 = dup3(r2, r1, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00000001c0)={0x2001})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a)

16:45:38 executing program 5:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00')
sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0)

16:45:39 executing program 3:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

16:45:39 executing program 4:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

16:45:40 executing program 5:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00')
sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0)

16:45:40 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

[ 1109.729148] kauditd_printk_skb: 248 callbacks suppressed
[ 1109.729165] audit: type=1400 audit(1577724340.545:12778): avc:  denied  { map } for  pid=25759 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1109.983768] audit: type=1400 audit(1577724340.545:12779): avc:  denied  { write } for  pid=25727 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
16:45:40 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

16:45:40 executing program 2:
perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil)
r0 = epoll_create1(0x0)
r1 = epoll_create1(0x0)
r2 = timerfd_create(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011})
r3 = socket$inet6(0xa, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040))
timerfd_settime(r2, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0)
epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x2a9)
r4 = dup3(r2, r1, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00000001c0)={0x2001})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a)

[ 1110.221887] audit: type=1400 audit(1577724340.615:12780): avc:  denied  { map } for  pid=25762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:41 executing program 3:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

[ 1110.392520] audit: type=1400 audit(1577724340.615:12781): avc:  denied  { map } for  pid=25762 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1110.502937] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1110.529164] audit: audit_backlog=65 > audit_backlog_limit=64
16:45:41 executing program 4:
r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0)
r1 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1})
fcntl$setlease(r0, 0x400, 0x1)
open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0)
ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x4004400})
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
socket$packet(0x11, 0x3, 0x300)
sched_setscheduler(0x0, 0x5, 0x0)
r2 = socket$inet(0x2, 0x0, 0x0)
setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x20, 0x0)
ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f00000001c0)={{0x0, 0x3f, 0x1, 0xff, 0x3}, 0x101})
close(r0)

[ 1110.553254] audit: type=1400 audit(1577724340.615:12782): avc:  denied  { map } for  pid=25762 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1110.583002] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1110.608743] audit: audit_lost=60 audit_rate_limit=0 audit_backlog_limit=64
[ 1110.617371] audit: audit_lost=61 audit_rate_limit=0 audit_backlog_limit=64
16:45:42 executing program 5:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00')
sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r1, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0)

16:45:42 executing program 2:
perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil)
r0 = epoll_create1(0x0)
r1 = epoll_create1(0x0)
r2 = timerfd_create(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011})
r3 = socket$inet6(0xa, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040))
timerfd_settime(r2, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0)
epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x2a9)
r4 = dup3(r2, r1, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00000001c0)={0x2001})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a)

16:45:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8}]}}}]}, 0x3c}}, 0x0)

16:45:43 executing program 4:
r0 = socket(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000540007031dfffd946f610500070000006700000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

16:45:44 executing program 5:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0)
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', 0x0, 0x0)

16:45:44 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

[ 1113.829070] netlink: 'syz-executor.3': attribute type 23 has an invalid length.
16:45:44 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff)
openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1)
ioctl$TCXONC(r1, 0x540a, 0x7)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)
r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0)
ioctl$TCXONC(r3, 0x540a, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x7)
clock_gettime(0x0, &(0x7f0000003e80))
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1)
mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff)
gettid()
syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x0, 0x0)
r7 = socket(0x2000000000000010, 0x3, 0x0)
r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="1400000086b7e163f13cfb689b8fc2d8d3d19ee67f9505b524c58f9e80408c8fa086fefe130ad7947ec318a3e2e9da106f3de9987b8570e27cc6c0d67b76ebed22992afdc65aa294b353be89767cdc74f44651d62f1a2a6d4f5800c75108e9d68812f9f1b583f359", @ANYBLOB="03050000000000"], 0x2}}, 0x0)
sendmsg$IPVS_CMD_GET_INFO(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000cdb0eb9f1c43ae2a507a4b8e8aa50dbcfacecb8bf48970dafa", @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x8000)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, 0x0, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)
r9 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
socket(0x2000000000000010, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0)
sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0)

[ 1113.928145] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 1113.954646] PF_BRIDGE: br_mdb_parse() with unknown ifindex
16:45:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8}]}}}]}, 0x3c}}, 0x0)

16:45:44 executing program 4:
r0 = socket(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000540007031dfffd946f610500070000006700000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

16:45:45 executing program 2:
perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil)
r0 = epoll_create1(0x0)
r1 = epoll_create1(0x0)
r2 = timerfd_create(0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011})
r3 = socket$inet6(0xa, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000040))
timerfd_settime(r2, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0)
epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xffffffffffffffff, 0x0, 0x2a9)
r4 = dup3(r2, r1, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f00000001c0)={0x2001})
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a)

16:45:45 executing program 5:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0)
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', 0x0, 0x0)

[ 1114.776597] kauditd_printk_skb: 315 callbacks suppressed
[ 1114.776616] audit: type=1400 audit(1577724345.595:13076): avc:  denied  { map } for  pid=25832 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1114.965343] audit: type=1400 audit(1577724345.595:13077): avc:  denied  { map } for  pid=25832 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1115.052355] netlink: 'syz-executor.3': attribute type 23 has an invalid length.
[ 1115.099341] audit: type=1400 audit(1577724345.595:13078): avc:  denied  { map } for  pid=25832 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1115.200444] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 1115.215357] PF_BRIDGE: br_mdb_parse() with unknown ifindex
[ 1115.274552] audit: type=1400 audit(1577724345.635:13079): avc:  denied  { map } for  pid=25834 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:46 executing program 4:
r0 = socket(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000540007031dfffd946f610500070000006700000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

16:45:46 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8}]}}}]}, 0x3c}}, 0x0)

[ 1115.516668] audit: type=1400 audit(1577724345.685:13081): avc:  denied  { map } for  pid=25838 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1115.694398] audit: type=1400 audit(1577724345.685:13082): avc:  denied  { map } for  pid=25838 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:46 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

[ 1115.910712] audit: type=1400 audit(1577724345.705:13083): avc:  denied  { map } for  pid=25834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:46 executing program 5:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0)
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', 0x0, 0x0)

[ 1116.135280] audit: type=1400 audit(1577724345.705:13084): avc:  denied  { map } for  pid=25834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1116.309332] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1116.350602] audit: audit_lost=69 audit_rate_limit=0 audit_backlog_limit=64
[ 1116.425918] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 1116.510276] PF_BRIDGE: br_mdb_parse() with unknown ifindex
16:45:47 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1116.565394] netlink: 'syz-executor.3': attribute type 23 has an invalid length.
16:45:47 executing program 4:
r0 = socket(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000540007031dfffd946f610500070000006700000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)

16:45:47 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_SNOOPING={0x8}]}}}]}, 0x3c}}, 0x0)

16:45:47 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a005", 0x18, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x18, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x2, 0x0, [0x88640000]}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}]}}}}}}, 0x0)

16:45:47 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

16:45:48 executing program 5:
mkdir(&(0x7f0000000380)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0)
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', 0x0, 0x0)

[ 1117.560079] input: syz1 as /devices/virtual/input/input60
[ 1117.789406] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 1117.896345] PF_BRIDGE: br_mdb_parse() with unknown ifindex
[ 1117.933333] netlink: 'syz-executor.3': attribute type 23 has an invalid length.
[ 1117.989363] input: syz1 as /devices/virtual/input/input61
16:45:48 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a005", 0x18, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x18, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x2, 0x0, [0x88640000]}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}]}}}}}}, 0x0)

16:45:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

16:45:49 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

16:45:49 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

16:45:49 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

16:45:49 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

16:45:50 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a005", 0x18, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x18, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x2, 0x0, [0x88640000]}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}]}}}}}}, 0x0)

16:45:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

16:45:50 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1119.787793] kauditd_printk_skb: 189 callbacks suppressed
[ 1119.787810] audit: type=1400 audit(1577724350.605:13272): avc:  denied  { map } for  pid=25900 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:50 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

[ 1120.007664] input: syz1 as /devices/virtual/input/input62
[ 1120.099758] audit: type=1400 audit(1577724350.605:13273): avc:  denied  { map } for  pid=25900 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:51 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1120.376486] audit: type=1400 audit(1577724350.635:13274): avc:  denied  { map } for  pid=25905 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1120.606137] audit: type=1400 audit(1577724350.655:13275): avc:  denied  { map } for  pid=25905 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:51 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a005", 0x18, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x18, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x2, 0x0, [0x88640000]}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}]}}}}}}, 0x0)

16:45:51 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1120.778477] audit: type=1400 audit(1577724350.775:13276): avc:  denied  { map } for  pid=25905 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:51 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, 0x0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000005840)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000001580)=""/96, 0x60}, {&(0x7f0000001680)=""/162, 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/62, 0x3e}, {0x0}, {&(0x7f0000001c00)=""/210, 0xd2}, {&(0x7f0000001d00)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004bc0)=""/4, 0x4}], 0x6}, 0x1}, {{&(0x7f0000004700)=@llc, 0x80, 0x0, 0x0, &(0x7f0000004900)=""/58, 0x3a}, 0x8}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, &(0x7f0000005280)}, 0x2}, {{0x0, 0x0, &(0x7f0000005780), 0x0, &(0x7f0000005800)=""/36, 0x24}}], 0x6, 0x1, 0x0)
getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000005a80)=""/102, &(0x7f0000005b00)=0x66)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x2, 0x0, [{0x8004, 0xed, &(0x7f0000000200)=""/237}, {0x0, 0x0, 0x0}]})

[ 1121.021818] audit: type=1400 audit(1577724350.775:13277): avc:  denied  { map } for  pid=25905 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:52 executing program 3:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1121.231118] audit: type=1400 audit(1577724351.055:13278): avc:  denied  { map } for  pid=25911 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1121.415277] audit: type=1400 audit(1577724351.085:13279): avc:  denied  { map } for  pid=25911 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:52 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1121.615926] audit: type=1400 audit(1577724351.155:13280): avc:  denied  { map } for  pid=25911 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1121.843275] audit: type=1400 audit(1577724351.155:13281): avc:  denied  { map } for  pid=25911 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:52 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

16:45:52 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNATTACHFILTER(r0, 0x800454dd, &(0x7f0000000080)={0x0, 0x0})

16:45:53 executing program 4:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket(0x2, 0x803, 0x0)
dup(r0)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
sched_setscheduler(0x0, 0x5, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = gettid()
ptrace$setopts(0x4206, r1, 0x0, 0x0)
r2 = getuid()
r3 = getegid()
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc)
r4 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags})
r5 = socket$inet(0x2, 0x4000000805, 0x0)
r6 = socket$inet_sctp(0x2, 0x5, 0x84)
r7 = dup3(r5, r6, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r8=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0x8)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r10)
r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011})
ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1')
r12 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r12, 0x200004)
sendfile(r10, r12, 0x0, 0x80001d00c0d0)

16:45:53 executing program 3:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c)

[ 1122.428693] input: syz1 as /devices/virtual/input/input63
16:45:53 executing program 5:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

16:45:53 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1123.326997] input: syz1 as /devices/virtual/input/input64
16:45:54 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3da, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000b00ac14142603000e12050000000000812fa8000800a4001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0)

16:45:54 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNATTACHFILTER(r0, 0x800454dd, &(0x7f0000000080)={0x0, 0x0})

16:45:55 executing program 0:
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'ip6erspan0\x00', {0x2, 0x0, @broadcast}})
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000380)="f00fc74f94ba4000b87700ef83d0bb263e050c00bad00466b86b00000066ef0f005c8e0fe82d66b98b0800000f320f013fbad10466b80000000066ef", 0x3c}], 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff], 0x1f004})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[ 1124.265435] input: syz1 as /devices/virtual/input/input65
[ 1124.517285] input: syz1 as /devices/virtual/input/input66
16:45:55 executing program 4:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket(0x2, 0x803, 0x0)
dup(r0)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
sched_setscheduler(0x0, 0x5, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = gettid()
ptrace$setopts(0x4206, r1, 0x0, 0x0)
r2 = getuid()
r3 = getegid()
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc)
r4 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags})
r5 = socket$inet(0x2, 0x4000000805, 0x0)
r6 = socket$inet_sctp(0x2, 0x5, 0x84)
r7 = dup3(r5, r6, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r8=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0x8)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r10)
r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011})
ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1')
r12 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r12, 0x200004)
sendfile(r10, r12, 0x0, 0x80001d00c0d0)

[ 1124.806287] kauditd_printk_skb: 183 callbacks suppressed
[ 1124.806303] audit: type=1400 audit(1577724355.625:13465): avc:  denied  { map } for  pid=25979 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1124.825922] netlink: 'syz-executor.3': attribute type 11 has an invalid length.
16:45:55 executing program 5:
perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11a09}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

[ 1125.077574] audit: type=1400 audit(1577724355.705:13466): avc:  denied  { map } for  pid=25980 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:56 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
getpid()
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0)
write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c)
ioctl$UI_DEV_CREATE(r1, 0x5501)
close(0xffffffffffffffff)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e54000/0x2000)=nil, &(0x7f0000f8f000/0x2000)=nil, 0x0, 0x0, r1}, 0x68)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
close(0xffffffffffffffff)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x11)
ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0)
write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xe43249edfcb8ab4e, 0x0)
write$nbd(r2, 0x0, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10)

[ 1125.308150] audit: type=1400 audit(1577724355.715:13467): avc:  denied  { map } for  pid=25976 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1125.529312] audit: type=1400 audit(1577724355.715:13468): avc:  denied  { map } for  pid=25976 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1125.575275] netlink: 'syz-executor.3': attribute type 11 has an invalid length.
16:45:56 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNATTACHFILTER(r0, 0x800454dd, &(0x7f0000000080)={0x0, 0x0})

[ 1125.735274] audit: type=1400 audit(1577724355.735:13469): avc:  denied  { map } for  pid=25979 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:45:56 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3da, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000b00ac14142603000e12050000000000812fa8000800a4001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0)

16:45:56 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={<r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a)
getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1a, 0x0, &(0x7f0000000080))
r5 = dup2(r0, r4)
dup3(r5, r1, 0x0)

[ 1125.953175] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1125.986421] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1126.001487] audit: type=1400 audit(1577724355.735:13470): avc:  denied  { map } for  pid=25979 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1126.044805] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1126.062858] audit: audit_lost=70 audit_rate_limit=0 audit_backlog_limit=64
16:45:57 executing program 5:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TIOCL_PASTESEL(r0, 0x802c542a, 0x0)
ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000002c0)={0x2c, &(0x7f0000000280)=[{}, {}]})
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9)
write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0)
ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x802c542a, 0x0)

[ 1126.847529] netlink: 'syz-executor.3': attribute type 11 has an invalid length.
16:45:58 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x5, 0x0)
r1 = epoll_create(0x7fff)
epoll_ctl$EPOLL_CTL_MOD(r1, 0x2, r0, 0x0)

16:45:58 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3da, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000b00ac14142603000e12050000000000812fa8000800a4001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0)

16:45:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0)
ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f00000003c0)={0x0, 0x6, 0x40})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000240))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0)
ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, 0x0)
write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="a7724b66def64346bc14b7b0f783d1d3abf9d1a51c4bfce1e7755128bd678625df08300200000040847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512"], 0x43)
r3 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe)
socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_opts(r3, 0x0, 0x0, &(0x7f0000000080)="6b17f19ca462d6", 0x7)
r4 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r4, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
r5 = open(0x0, 0x0, 0x0)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
ioctl$KVM_GET_DIRTY_LOG(r5, 0x4010ae42, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil})

16:45:58 executing program 4:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket(0x2, 0x803, 0x0)
dup(r0)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
sched_setscheduler(0x0, 0x5, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = gettid()
ptrace$setopts(0x4206, r1, 0x0, 0x0)
r2 = getuid()
r3 = getegid()
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc)
r4 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags})
r5 = socket$inet(0x2, 0x4000000805, 0x0)
r6 = socket$inet_sctp(0x2, 0x5, 0x84)
r7 = dup3(r5, r6, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r8=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0x8)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r10)
r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011})
ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1')
r12 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r12, 0x200004)
sendfile(r10, r12, 0x0, 0x80001d00c0d0)

16:45:58 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNATTACHFILTER(r0, 0x800454dd, &(0x7f0000000080)={0x0, 0x0})

16:45:59 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000007c0)={0x3, 0x2000000000000035, 0x0, <r1=>0xffffffffffffffff})
r2 = epoll_create(0x5)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000))

16:45:59 executing program 2:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00'})
ioctl$void(0xffffffffffffffff, 0x0)
mknod(0x0, 0x620, 0x0)
fchdir(r0)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000380)}, {&(0x7f0000000600)}], 0x2, 0x6)
r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)
ftruncate(r2, 0x8200)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)

[ 1128.598461] netlink: 'syz-executor.3': attribute type 11 has an invalid length.
16:46:00 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff, 0x1}, 0x20)
setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37)

16:46:00 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3da, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000b00ac14142603000e12050000000000812fa8000800a4001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0)

16:46:00 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x6000, 0x2000, &(0x7f0000000000/0x2000)=nil})

16:46:00 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000007c0)={0x3, 0x2000000000000035, 0x0, <r1=>0xffffffffffffffff})
r2 = epoll_create(0x5)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000))

[ 1129.818982] kauditd_printk_skb: 276 callbacks suppressed
[ 1129.819001] audit: type=1804 audit(1577724360.635:13706): pid=26062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir773859160/syzkaller.casMX4/133/bus" dev="sda1" ino=16772 res=1
[ 1129.918901] audit: type=1400 audit(1577724360.695:13707): avc:  denied  { map } for  pid=26053 comm="syz-executor.2" path="/root/syzkaller-testdir773859160/syzkaller.casMX4/133/bus" dev="sda1" ino=16772 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[ 1129.954614] audit: type=1804 audit(1577724360.735:13708): pid=26068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir773859160/syzkaller.casMX4/133/bus" dev="sda1" ino=16772 res=1
16:46:01 executing program 2:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

[ 1130.287222] audit: type=1400 audit(1577724360.835:13709): avc:  denied  { map } for  pid=26056 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1130.484900] audit: type=1400 audit(1577724360.835:13710): avc:  denied  { map } for  pid=26056 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:01 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r0, 0x88001)
r1 = open(&(0x7f0000000400)='./bus\x00', 0x4003a, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0)
read(r1, &(0x7f0000000180)=""/19, 0xfffffe47)

[ 1130.652122] audit: type=1400 audit(1577724360.855:13711): avc:  denied  { map } for  pid=26064 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1130.703613] netlink: 'syz-executor.3': attribute type 11 has an invalid length.
16:46:01 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000007c0)={0x3, 0x2000000000000035, 0x0, <r1=>0xffffffffffffffff})
r2 = epoll_create(0x5)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000))

[ 1130.780257] audit: type=1400 audit(1577724360.905:13712): avc:  denied  { map } for  pid=26069 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1130.926749] audit: type=1400 audit(1577724360.905:13713): avc:  denied  { map } for  pid=26069 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:01 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil)
socket$unix(0x1, 0x0, 0x0)
r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xd, 0x0)
ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000000c0))
setreuid(0x0, 0x0)
ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0)
ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f00000002c0)={0x5, @capture={0x1000, 0x3, {0x77ff}, 0x1}})
read$alg(0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)

[ 1131.054507] audit: type=1400 audit(1577724360.905:13714): avc:  denied  { map } for  pid=26069 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1131.263519] audit: type=1400 audit(1577724360.905:13715): avc:  denied  { map } for  pid=26069 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:02 executing program 4:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
r0 = socket(0x2, 0x803, 0x0)
dup(r0)
open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0)
sched_setscheduler(0x0, 0x5, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = gettid()
ptrace$setopts(0x4206, r1, 0x0, 0x0)
r2 = getuid()
r3 = getegid()
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc)
r4 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags})
r5 = socket$inet(0x2, 0x4000000805, 0x0)
r6 = socket$inet_sctp(0x2, 0x5, 0x84)
r7 = dup3(r5, r6, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, <r8=>0x0]}, &(0x7f0000a8a000)=0xc)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0x8)
r9 = socket$nl_netfilter(0x10, 0x3, 0xc)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r10)
r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011})
ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1')
r12 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r12, 0x200004)
sendfile(r10, r12, 0x0, 0x80001d00c0d0)

[ 1131.370904] FAT-fs (loop2): bogus number of reserved sectors
16:46:02 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
ioctl$sock_TIOCINQ(r3, 0x5411, &(0x7f0000000100))

16:46:02 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r0, 0x88001)
r1 = open(&(0x7f0000000400)='./bus\x00', 0x4003a, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0)
read(r1, &(0x7f0000000180)=""/19, 0xfffffe47)

[ 1131.583194] FAT-fs (loop2): Can't find a valid FAT filesystem
16:46:02 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000007c0)={0x3, 0x2000000000000035, 0x0, <r1=>0xffffffffffffffff})
r2 = epoll_create(0x5)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000))

[ 1132.115298] FAT-fs (loop2): bogus number of reserved sectors
[ 1132.135326] FAT-fs (loop2): Can't find a valid FAT filesystem
16:46:03 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="7c0000002c00d96a3bbf158a654d000000000000", @ANYRES32, @ANYBLOB="00000002000000000300c4c1080001006270660050000200080006000000000004000500400002003c00010000000000eeff0075da8916000000110000000000000000100000000000000000000000000000000000e4ff00ddffffff00"/115], 0x7c}}, 0x0)
r0 = socket(0x4000000000010, 0x1000000000080002, 0x0)
sendmmsg$alg(r0, &(0x7f0000000140), 0x42, 0x0)

[ 1132.386173] device ifb0 entered promiscuous mode
16:46:03 executing program 3:
setreuid(0x0, 0xee00)
r0 = geteuid()
setreuid(r0, 0x0)
r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r1, 0x202002)
keyctl$chown(0x4, r1, 0x0, 0x0)

[ 1132.674667] device ifb0 left promiscuous mode
16:46:03 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r0, 0x88001)
r1 = open(&(0x7f0000000400)='./bus\x00', 0x4003a, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0)
read(r1, &(0x7f0000000180)=""/19, 0xfffffe47)

16:46:03 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

16:46:04 executing program 2:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

16:46:04 executing program 3:
setreuid(0x0, 0xee00)
r0 = geteuid()
setreuid(r0, 0x0)
r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r1, 0x202002)
keyctl$chown(0x4, r1, 0x0, 0x0)

16:46:05 executing program 0:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

16:46:05 executing program 1:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r0, 0x88001)
r1 = open(&(0x7f0000000400)='./bus\x00', 0x4003a, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0)
read(r1, &(0x7f0000000180)=""/19, 0xfffffe47)

16:46:05 executing program 4:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0x61)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setfsuid(r2)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20000, &(0x7f0000000180)=ANY=[@ANYBLOB="18171557e34926d62c726664", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',fscache,cache=mmap,fscache,version=9p2000,mmap,afid=0x0000000000000006,access=client,loose,', @ANYBLOB])
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10)
unshare(0x40000000)

16:46:05 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

[ 1134.836274] kauditd_printk_skb: 250 callbacks suppressed
[ 1134.836292] audit: type=1400 audit(1577724365.655:13966): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.011446] audit: type=1400 audit(1577724365.665:13967): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:06 executing program 3:
setreuid(0x0, 0xee00)
r0 = geteuid()
setreuid(r0, 0x0)
r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r1, 0x202002)
keyctl$chown(0x4, r1, 0x0, 0x0)

[ 1135.265312] audit: type=1400 audit(1577724365.745:13968): avc:  denied  { map } for  pid=26158 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.560991] audit: type=1400 audit(1577724365.795:13969): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.589986] audit: type=1400 audit(1577724365.795:13970): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.616012] audit: type=1400 audit(1577724365.835:13971): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.637541] FAT-fs (loop2): bogus number of reserved sectors
[ 1135.865304] audit: type=1400 audit(1577724365.885:13972): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1135.885356] FAT-fs (loop0): bogus number of reserved sectors
[ 1135.966308] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1135.986490] IPVS: ftp: loaded support on port[0] = 21
16:46:06 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

[ 1136.106963] audit: type=1400 audit(1577724365.975:13973): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1136.134510] audit: type=1400 audit(1577724365.975:13974): avc:  denied  { map } for  pid=26158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1136.165079] audit: type=1400 audit(1577724365.975:13975): avc:  denied  { map } for  pid=26162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1136.196157] FAT-fs (loop0): Can't find a valid FAT filesystem
16:46:07 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

16:46:07 executing program 3:
setreuid(0x0, 0xee00)
r0 = geteuid()
setreuid(r0, 0x0)
r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r1, 0x202002)
keyctl$chown(0x4, r1, 0x0, 0x0)

16:46:07 executing program 4:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0x61)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setfsuid(r2)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20000, &(0x7f0000000180)=ANY=[@ANYBLOB="18171557e34926d62c726664", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',fscache,cache=mmap,fscache,version=9p2000,mmap,afid=0x0000000000000006,access=client,loose,', @ANYBLOB])
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10)
unshare(0x40000000)

16:46:07 executing program 2:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

16:46:08 executing program 0:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

16:46:08 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

16:46:08 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

16:46:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
r2 = dup2(r0, r1)
name_to_handle_at(r2, 0x0, 0x0, 0x0, 0x0)

[ 1138.124113] FAT-fs (loop2): bogus number of reserved sectors
[ 1138.193793] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1138.280547] IPVS: ftp: loaded support on port[0] = 21
[ 1138.465283] FAT-fs (loop0): bogus number of reserved sectors
[ 1138.471161] FAT-fs (loop0): Can't find a valid FAT filesystem
16:46:09 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080))
ptrace$getregset(0x4204, 0x0, 0x0, 0x0)
r0 = socket(0x15, 0x80005, 0x0)
bind(r0, &(0x7f00000000c0)=@generic={0xa, "9bab822c32e608631f5c14d557d502005efe7bb80b86526b51833790734bd83b320de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf9a6ae4edd919aec5bdf5aecb8ef68d0797117341f7"}, 0x80)
write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0)

16:46:10 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
r2 = dup2(r0, r1)
name_to_handle_at(r2, 0x0, 0x0, 0x0, 0x0)

16:46:10 executing program 0:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

16:46:10 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffdac)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000080)=0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
munlockall()
ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10003, 0x0, &(0x7f0000ffc000/0x1000)=nil})

16:46:10 executing program 2:
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0)
open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0)
getpid()
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001580)=0xe8)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8)
r3 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0)
r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd})
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'})
socket$nl_netfilter(0x10, 0x3, 0xc)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000000c0))
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
sendmsg$netlink(r2, &(0x7f0000000900)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000700000000000000000000000000b6a14e20b2fc523a26da5ab4b9e01cd0427900051b3aa5a6f0007e772c2bc9b0ed0038a5131436e5ba2df3c4ce43926269047af12b9351c57bf2927e0ab59fc38ece5303d34aeeda46e3f22965705bc0c2ee1baf07d57e4ac220616e6af0492c523705a3970ff7dcfa9a3e2a0198a0edb16853a2a03cfe79a7c3ee5be6df8673afd32da21b6bec991f7043a66d811700", @ANYRES32=0x0, @ANYBLOB="04000000"], 0xc7, 0x8000}, 0x14008010)
lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
pipe(&(0x7f0000000080)={<r7=>0xffffffffffffffff})
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc)
getresuid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780))
write(0xffffffffffffffff, &(0x7f0000000080)="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", 0xfc)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r8 = getpid()
sched_setscheduler(r8, 0x5, &(0x7f0000000380))
pipe(&(0x7f0000000080))
pipe(&(0x7f0000000080)={<r9=>0xffffffffffffffff})
r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0)
splice(r9, 0x0, r10, 0x0, 0x18, 0x0)
pipe(0x0)
sched_setscheduler(0x0, 0x5, 0x0)
openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)

[ 1139.862707] kauditd_printk_skb: 141 callbacks suppressed
[ 1139.862724] audit: type=1400 audit(1577724370.675:14117): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1139.949050] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma?
[ 1140.065346] audit: type=1400 audit(1577724370.675:14118): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1140.123611] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma?
16:46:11 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080))
ptrace$getregset(0x4204, 0x0, 0x0, 0x0)
r0 = socket(0x15, 0x80005, 0x0)
bind(r0, &(0x7f00000000c0)=@generic={0xa, "9bab822c32e608631f5c14d557d502005efe7bb80b86526b51833790734bd83b320de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf9a6ae4edd919aec5bdf5aecb8ef68d0797117341f7"}, 0x80)
write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0)

[ 1140.312174] FAT-fs (loop0): bogus number of reserved sectors
[ 1140.324224] audit: type=1400 audit(1577724370.765:14119): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1140.435773] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 1140.521308] audit: type=1400 audit(1577724370.775:14120): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1140.615518] FAT-fs (loop2): bogus number of reserved sectors
[ 1140.702240] audit: type=1400 audit(1577724370.815:14121): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1140.747656] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1140.867512] audit: type=1400 audit(1577724370.845:14122): avc:  denied  { map } for  pid=26237 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1141.084562] audit: type=1400 audit(1577724371.325:14123): avc:  denied  { map } for  pid=26250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1141.246234] audit: type=1400 audit(1577724371.325:14124): avc:  denied  { map } for  pid=26250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1141.273366] device ifb0 entered promiscuous mode
[ 1141.395849] device ifb0 left promiscuous mode
[ 1141.412785] audit: type=1400 audit(1577724371.355:14125): avc:  denied  { map } for  pid=26250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1141.487759] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma?
[ 1141.601636] audit: type=1400 audit(1577724371.365:14126): avc:  denied  { map } for  pid=26250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1144.869158] kauditd_printk_skb: 141 callbacks suppressed
[ 1144.869176] audit: type=1400 audit(1577724375.685:14268): avc:  denied  { map } for  pid=26275 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1144.971208] audit: type=1400 audit(1577724375.725:14269): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.075769] audit: type=1400 audit(1577724375.725:14270): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.205480] audit: type=1400 audit(1577724375.735:14271): avc:  denied  { map } for  pid=26275 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.300879] audit: type=1400 audit(1577724375.755:14273): avc:  denied  { map } for  pid=26275 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.378328] audit: type=1400 audit(1577724375.775:14274): avc:  denied  { map } for  pid=26275 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.477332] audit: type=1400 audit(1577724375.755:14272): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.588344] audit: type=1400 audit(1577724375.785:14275): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.673090] audit: type=1400 audit(1577724375.825:14276): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1145.795474] audit: type=1400 audit(1577724375.825:14277): avc:  denied  { map } for  pid=26276 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:17 executing program 4:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0x61)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setfsuid(r2)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20000, &(0x7f0000000180)=ANY=[@ANYBLOB="18171557e34926d62c726664", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',fscache,cache=mmap,fscache,version=9p2000,mmap,afid=0x0000000000000006,access=client,loose,', @ANYBLOB])
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10)
unshare(0x40000000)

16:46:17 executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000680), &(0x7f0000000080)}, 0x20)

16:46:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
r2 = dup2(r0, r1)
name_to_handle_at(r2, 0x0, 0x0, 0x0, 0x0)

16:46:17 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0)

16:46:17 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080))
ptrace$getregset(0x4204, 0x0, 0x0, 0x0)
r0 = socket(0x15, 0x80005, 0x0)
bind(r0, &(0x7f00000000c0)=@generic={0xa, "9bab822c32e608631f5c14d557d502005efe7bb80b86526b51833790734bd83b320de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf9a6ae4edd919aec5bdf5aecb8ef68d0797117341f7"}, 0x80)
write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0)

16:46:17 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x87)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000040)=@ethtool_eee={0xa}})

[ 1147.187197] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma?
16:46:18 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x87)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000040)=@ethtool_eee={0xa}})

16:46:18 executing program 5:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080))
ptrace$getregset(0x4204, 0x0, 0x0, 0x0)
r0 = socket(0x15, 0x80005, 0x0)
bind(r0, &(0x7f00000000c0)=@generic={0xa, "9bab822c32e608631f5c14d557d502005efe7bb80b86526b51833790734bd83b320de89aefc9eb6dc2649bdf2b6ab524effc499e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed60dd4c3806342de9067b7aecf9a6ae4edd919aec5bdf5aecb8ef68d0797117341f7"}, 0x80)
write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0)

16:46:18 executing program 0:
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mkdir(&(0x7f0000001240)='./file0\x00', 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f00000001c0))
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setreuid(0x0, r2)
setresuid(0x0, 0x0, r2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8)
mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x4, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0xfffffffffffffb8f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x7fff}}], [{@uid_gt={'uid>', r2}}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_user={'obj_user', 0x3d, 'rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q'}}, {@uid_eq={'uid'}}, {@smackfsdef={'smackfsdef', 0x3d, 'rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q'}}]})
umount2(&(0x7f0000000240)='./file0\x00', 0x0)
listxattr(0x0, &(0x7f0000000140)=""/18, 0x12)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)

16:46:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0)
r1 = socket$xdp(0x2c, 0x3, 0x0)
r2 = dup2(r0, r1)
name_to_handle_at(r2, 0x0, 0x0, 0x0, 0x0)

16:46:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100), &(0x7f0000000140)=0x8)

[ 1148.094374] IPVS: ftp: loaded support on port[0] = 21
[ 1148.334764] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:200:5efe:123.184.11.134, load rds_tcp or rds_rdma?
16:46:19 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x87)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000040)=@ethtool_eee={0xa}})

16:46:19 executing program 4:
r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0x61)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setfsuid(r2)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20000, &(0x7f0000000180)=ANY=[@ANYBLOB="18171557e34926d62c726664", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',fscache,cache=mmap,fscache,version=9p2000,mmap,afid=0x0000000000000006,access=client,loose,', @ANYBLOB])
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10)
unshare(0x40000000)

16:46:19 executing program 1:
r0 = socket$kcm(0x21, 0x2, 0x2)
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001140)=[{0x10, 0x110, 0x9}], 0x10}, 0x0)

16:46:19 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = dup2(r0, r0)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="bd00dccc3d37255ded9235a24e6ca0a1"}, 0x1c)

16:46:19 executing program 3:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSKBENT(r0, 0x4b4c, &(0x7f0000000000)={0x0, 0x6a})

16:46:20 executing program 1:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$int_in(r0, 0x40000000af01, 0x0)
ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0)
close(0xffffffffffffffff)
socket$packet(0x11, 0x0, 0x300)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8))

16:46:20 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x87)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000040)=@ethtool_eee={0xa}})

[ 1149.898558] kauditd_printk_skb: 113 callbacks suppressed
[ 1149.898574] audit: type=1400 audit(1577724380.715:14391): avc:  denied  { map } for  pid=26322 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:20 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getdents64(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00000003c0))
r1 = syz_open_pts(r0, 0x0)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x2)
readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1)
dup3(r1, r0, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write$RDMA_USER_CM_CMD_LISTEN(r2, 0x0, 0x0)
write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0)
getdents64(0xffffffffffffffff, 0x0, 0x0)
getresuid(0x0, 0x0, 0x0)
ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0)

16:46:20 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90408486516080003001400000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

[ 1150.074279] IPVS: ftp: loaded support on port[0] = 21
[ 1150.145789] audit: type=1400 audit(1577724380.755:14392): avc:  denied  { map } for  pid=26322 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1150.290226] audit: type=1400 audit(1577724380.755:14393): avc:  denied  { map } for  pid=26322 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1150.523115] audit: type=1400 audit(1577724380.775:14394): avc:  denied  { sys_ptrace } for  pid=26151 comm="ps" capability=19  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1
[ 1150.693001] audit: type=1400 audit(1577724380.895:14395): avc:  denied  { sys_ptrace } for  pid=26151 comm="ps" capability=19  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1
[ 1150.834167] audit: type=1400 audit(1577724381.025:14396): avc:  denied  { map } for  pid=26334 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1151.024752] audit: type=1400 audit(1577724381.025:14397): avc:  denied  { map } for  pid=26334 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1151.220605] SELinux:  duplicate or incompatible mount options
[ 1151.234935] audit: type=1400 audit(1577724381.025:14398): avc:  denied  { map } for  pid=26334 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1151.385318] audit: type=1400 audit(1577724381.075:14399): avc:  denied  { map } for  pid=26334 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1151.620210] audit: type=1400 audit(1577724381.145:14400): avc:  denied  { map } for  pid=26334 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:22 executing program 0:
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0)
pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"})

16:46:22 executing program 1:
socket$netlink(0x10, 0x3, 0x0)
r0 = socket(0x0, 0x3, 0x1)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xffffffffffffffac)
sched_setattr(0x0, 0x0, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f035000c803cf", 0x2f}], 0xaaaaaaaaaaaad09, 0x0, 0x0, 0x238)
ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60)
syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/pid\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00')
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x4c8, 0x0, 0x0, 0x7ff]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
add_key$user(0x0, 0x0, 0x0, 0x0, 0x0)
fallocate(0xffffffffffffffff, 0x10, 0x0, 0x2000002)
open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)

16:46:22 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90408486516080003001400000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

16:46:22 executing program 5:
r0 = add_key(&(0x7f0000000680)='.dead\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="76ee75cc8e631a4af2920b2ac9cc88243c810ddca3dbadeb888244911c2dce83ac77101375908f0cf24a26c20f1fbda903084eb665114cceae58499be6a74b79059d7821145f66be25", 0x49, 0xfffffffffffffffd)
request_key(&(0x7f0000000800)='encrypted\x00', &(0x7f0000000840)={'syz', 0x3}, &(0x7f00000009c0)=':chain\x00', r0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000006c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'})
r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082)
r2 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f00000007c0))
sendmsg$nl_generic(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYBLOB="64a9de076dca0e8605a31cef3ab1a5cd02377f28908d669b991d76740dadc3f5a3b7c0b3b172f911f68412b81c29ab57624c32bff42e05b50cbf6e03a74142de293129e7115e6638b1343cdcb16285e3fe0f374f9b76087fd4802c0000003d311688365b184052d1d7a52266025b56aa0d76afe4624740dd26c9ca9f273e2f93815f17000000fd8f6e9673d110e6f5ec486d030c1bab7b0000"], 0x2}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000081)
syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x105000)
pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff)
write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13)
sendto$packet(r3, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f1abfb49337c33a5e9835de9d19f3af72c04f7b9a559807aa4bad25ba1522a02aca6fbd2a57da241f8b948953d367f8268f1bf76792dcbb2b5f3444bdb18a68a68b05b47dc0b04488d35a9e0a6febd6a9c5e16a7c5ac8f2eafa95b9f7ab4e778ae3d2872200ed1b135ee5fa", 0xdd, 0x4000, &(0x7f0000000400)={0x11, 0xf6, 0x0, 0x1, 0xfe, 0x6, @random="2e1700"}, 0x14)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r1, 0x0, 0x40fdf)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$KVM_NMI(r4, 0xae9a)
r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0xc)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x3]}, 0x5c)

16:46:22 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
r1 = socket$inet(0x2b, 0x1, 0x0)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10)
connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10)
r2 = dup(r1)
recvmsg$can_bcm(r2, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0)

16:46:22 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x4)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000001400000", 0xfe9f}], 0x1)

16:46:23 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x4)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000001400000", 0xfe9f}], 0x1)

16:46:23 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90408486516080003001400000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

16:46:23 executing program 4:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc))
r3 = syz_open_pts(r2, 0x1)
fcntl$setstatus(r3, 0x4, 0x102800)
write(r3, &(0x7f0000000000)="d5", 0xfffffedf)
ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x19)
dup3(r3, r2, 0x0)

[ 1153.115847] loop_set_status: loop0 () has still dirty pages (nrpages=32)
16:46:24 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00\x00\x00\x06\x10\x00', 0x420000015001})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup3(r2, r1, 0x0)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'})
close(r0)

16:46:24 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90408486516080003001400000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

[ 1153.624409] print_req_error: 53 callbacks suppressed
[ 1153.624418] print_req_error: I/O error, dev loop0, sector 0
[ 1153.635439] buffer_io_error: 54 callbacks suppressed
[ 1153.635449] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.676397] print_req_error: I/O error, dev loop0, sector 0
[ 1153.682227] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.691040] print_req_error: I/O error, dev loop0, sector 0
[ 1153.696839] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.704184] print_req_error: I/O error, dev loop0, sector 0
[ 1153.710008] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.725555] print_req_error: I/O error, dev loop0, sector 0
[ 1153.731331] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.740233] print_req_error: I/O error, dev loop0, sector 0
[ 1153.746030] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.753403] print_req_error: I/O error, dev loop0, sector 0
[ 1153.759207] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.769329] print_req_error: I/O error, dev loop0, sector 0
[ 1153.775097] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.783843] ldm_validate_partition_table(): Disk read failed.
[ 1153.855468] print_req_error: I/O error, dev loop0, sector 0
[ 1153.861270] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.873427] print_req_error: I/O error, dev loop0, sector 0
[ 1153.879279] Buffer I/O error on dev loop0, logical block 0, async page read
[ 1153.889169] Dev loop0: unable to read RDB block 0
16:46:24 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT')
preadv(r0, &(0x7f0000002580)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x1dd)

[ 1153.963221]  loop0: unable to read partition table
[ 1154.033843] loop_reread_partitions: partition scan of loop0 (�8�b�+�?���s�=7]c��I�ir�n���0�jub�x—J��t}̳c���YUB) failed (rc=-5)
16:46:25 executing program 0:
r0 = socket$inet(0x2, 0x2000080001, 0x84)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8)
sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x4352}], 0x1}, 0x2000)
r1 = socket$inet6(0xa, 0x80003, 0x80)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
recvmmsg(r0, &(0x7f0000002840)=[{{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000a40)=""/194, 0x2e2}, {&(0x7f0000000b40)=""/207, 0xd1}, {&(0x7f0000000c40)=""/214, 0x95}, {&(0x7f0000000d40)=""/241, 0xf1}], 0x4}}], 0x300, 0x0, 0x0)

16:46:25 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x4)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000001400000", 0xfe9f}], 0x1)

16:46:25 executing program 5:
r0 = add_key(&(0x7f0000000680)='.dead\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="76ee75cc8e631a4af2920b2ac9cc88243c810ddca3dbadeb888244911c2dce83ac77101375908f0cf24a26c20f1fbda903084eb665114cceae58499be6a74b79059d7821145f66be25", 0x49, 0xfffffffffffffffd)
request_key(&(0x7f0000000800)='encrypted\x00', &(0x7f0000000840)={'syz', 0x3}, &(0x7f00000009c0)=':chain\x00', r0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000006c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'})
r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082)
r2 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f00000007c0))
sendmsg$nl_generic(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYBLOB="64a9de076dca0e8605a31cef3ab1a5cd02377f28908d669b991d76740dadc3f5a3b7c0b3b172f911f68412b81c29ab57624c32bff42e05b50cbf6e03a74142de293129e7115e6638b1343cdcb16285e3fe0f374f9b76087fd4802c0000003d311688365b184052d1d7a52266025b56aa0d76afe4624740dd26c9ca9f273e2f93815f17000000fd8f6e9673d110e6f5ec486d030c1bab7b0000"], 0x2}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000081)
syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x105000)
pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff)
write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13)
sendto$packet(r3, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f1abfb49337c33a5e9835de9d19f3af72c04f7b9a559807aa4bad25ba1522a02aca6fbd2a57da241f8b948953d367f8268f1bf76792dcbb2b5f3444bdb18a68a68b05b47dc0b04488d35a9e0a6febd6a9c5e16a7c5ac8f2eafa95b9f7ab4e778ae3d2872200ed1b135ee5fa", 0xdd, 0x4000, &(0x7f0000000400)={0x11, 0xf6, 0x0, 0x1, 0xfe, 0x6, @random="2e1700"}, 0x14)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r1, 0x0, 0x40fdf)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$KVM_NMI(r4, 0xae9a)
r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0xc)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x3]}, 0x5c)

16:46:25 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000300000000000000000005007c00000000000000280000000000d4e34ba67f6ebd451a22dec4c83108206624ca7a4f9d38e16565816eb68ca2229428aa5a5282ff43ba0c2b77d868c0757da79288e04d070051f4250c50a90d78c71bda26da6a82cd52dd2d76293b3b3227c729dd5e6e5c22e6be459729a42093eb3d7f774607000000ae21bf460be085c86d383a064ea312ba66db4ce4943c4b4d41c97ed370c68287b2e940eb689162949f0e10a9edd02e3913d8454500"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
sched_setattr(0x0, 0x0, 0x0)

[ 1154.943282] kauditd_printk_skb: 144 callbacks suppressed
[ 1154.943299] audit: type=1400 audit(1577724385.755:14545): avc:  denied  { map } for  pid=26401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1155.147621] audit: type=1400 audit(1577724385.795:14546): avc:  denied  { map } for  pid=26401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:26 executing program 4:
futex(&(0x7f000000cffc)=0x8080000000000004, 0x80000000000b, 0x4, 0x0, &(0x7f0000000040), 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000000000), 0x0)

[ 1155.342922] audit: type=1400 audit(1577724385.795:14547): avc:  denied  { map } for  pid=26402 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:26 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x4)
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000001400000", 0xfe9f}], 0x1)

[ 1155.576447] audit: type=1400 audit(1577724385.805:14548): avc:  denied  { map } for  pid=26405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1155.748221] audit: type=1400 audit(1577724385.805:14549): avc:  denied  { map } for  pid=26405 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1155.958927] audit: type=1400 audit(1577724385.815:14550): avc:  denied  { map } for  pid=26402 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1156.087007] audit: type=1400 audit(1577724385.825:14551): avc:  denied  { map } for  pid=26405 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1156.115271] audit: type=1400 audit(1577724385.825:14552): avc:  denied  { map } for  pid=26405 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:27 executing program 0:
socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r3, &(0x7f0000000080)=[{0x10081, 0x5}], 0x30)

[ 1156.542055] audit: type=1400 audit(1577724385.875:14553): avc:  denied  { map } for  pid=26402 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:27 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00\x00\x00\x06\x10\x00', 0x420000015001})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup3(r2, r1, 0x0)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'})
close(r0)

[ 1156.782039] audit: type=1400 audit(1577724385.885:14554): avc:  denied  { map } for  pid=26401 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:27 executing program 5:
r0 = add_key(&(0x7f0000000680)='.dead\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="76ee75cc8e631a4af2920b2ac9cc88243c810ddca3dbadeb888244911c2dce83ac77101375908f0cf24a26c20f1fbda903084eb665114cceae58499be6a74b79059d7821145f66be25", 0x49, 0xfffffffffffffffd)
request_key(&(0x7f0000000800)='encrypted\x00', &(0x7f0000000840)={'syz', 0x3}, &(0x7f00000009c0)=':chain\x00', r0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000006c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'})
r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082)
r2 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f00000007c0))
sendmsg$nl_generic(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="a8010009000000000000001500000094016c00080087000000084fc6d110a91cad3571a22d671807949874b4b55c01012d2e78008e1aacb43a17e386dfc501c1674e9492b3663206f2673b7aaf02872edb3e3e57a4c19ecf5fd7bf9639598c72d88e2f62f6d4a8d2771f1e23e744ffa85a7e59259bed9c03c79b7183f54327f37f38df7b09e2dcf854890c4f62375c79247bd0f824b8cfd4bca27fa91714b429e28ab6d823b930912ac4bb3aac8f713deac1a95ddc86b2e4968d156d783acd2130e9dc6f377b58b2181eb539cef6906e25c3635acbe43052d29da987e0032a5fc319b4cb5048f95a585c4aae088fc723519a2065d97d23fdc78b8d23d7080089005c7e14ca39cbabaa980d35b4b29b5c904a80382856fbc1b02f37bac461ad0e6046ba1a9e3cdb2f555d4d8d76773a21dd36018606ad677fc0b3ba85460ace094d63a0741491f104d7f24ada0943170687b441800fbf62a0aef7b27a195415bb7d0e51f134a425f7ea4c2cb7ab7459379ac751140b7a66aa758cbd88d20794cc8835e66c91af2d4f3eaa9004abcc00b3bc880cb1c3ed6cda1339a935dc1b9e3ff87a15f25a88879bd33707a8a8351b25684127730c6b29e7efd1ccd1bc437761e16726744881ac470000000000", @ANYBLOB="64a9de076dca0e8605a31cef3ab1a5cd02377f28908d669b991d76740dadc3f5a3b7c0b3b172f911f68412b81c29ab57624c32bff42e05b50cbf6e03a74142de293129e7115e6638b1343cdcb16285e3fe0f374f9b76087fd4802c0000003d311688365b184052d1d7a52266025b56aa0d76afe4624740dd26c9ca9f273e2f93815f17000000fd8f6e9673d110e6f5ec486d030c1bab7b0000"], 0x2}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000081)
syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x105000)
pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff)
write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13)
sendto$packet(r3, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f1abfb49337c33a5e9835de9d19f3af72c04f7b9a559807aa4bad25ba1522a02aca6fbd2a57da241f8b948953d367f8268f1bf76792dcbb2b5f3444bdb18a68a68b05b47dc0b04488d35a9e0a6febd6a9c5e16a7c5ac8f2eafa95b9f7ab4e778ae3d2872200ed1b135ee5fa", 0xdd, 0x4000, &(0x7f0000000400)={0x11, 0xf6, 0x0, 0x1, 0xfe, 0x6, @random="2e1700"}, 0x14)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r1, 0x0, 0x40fdf)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$KVM_NMI(r4, 0xae9a)
r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0xc)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x3]}, 0x5c)

16:46:27 executing program 2:
sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1200000}, 0xc, 0x0}, 0x0)
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0)
readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x200000000000000f)

16:46:27 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000300000000000000000005007c00000000000000280000000000d4e34ba67f6ebd451a22dec4c83108206624ca7a4f9d38e16565816eb68ca2229428aa5a5282ff43ba0c2b77d868c0757da79288e04d070051f4250c50a90d78c71bda26da6a82cd52dd2d76293b3b3227c729dd5e6e5c22e6be459729a42093eb3d7f774607000000ae21bf460be085c86d383a064ea312ba66db4ce4943c4b4d41c97ed370c68287b2e940eb689162949f0e10a9edd02e3913d8454500"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
sched_setattr(0x0, 0x0, 0x0)

16:46:28 executing program 4:
futex(&(0x7f000000cffc)=0x8080000000000004, 0x80000000000b, 0x4, 0x0, &(0x7f0000000040), 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000000000), 0x0)

16:46:28 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00\x00\x00\x06\x10\x00', 0x420000015001})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup3(r2, r1, 0x0)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'})
close(r0)

16:46:29 executing program 0:
r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000480)={0x1})

16:46:29 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x4, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

16:46:29 executing program 4:
futex(&(0x7f000000cffc)=0x8080000000000004, 0x80000000000b, 0x4, 0x0, &(0x7f0000000040), 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000000000), 0x0)

16:46:30 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000300000000000000000005007c00000000000000280000000000d4e34ba67f6ebd451a22dec4c83108206624ca7a4f9d38e16565816eb68ca2229428aa5a5282ff43ba0c2b77d868c0757da79288e04d070051f4250c50a90d78c71bda26da6a82cd52dd2d76293b3b3227c729dd5e6e5c22e6be459729a42093eb3d7f774607000000ae21bf460be085c86d383a064ea312ba66db4ce4943c4b4d41c97ed370c68287b2e940eb689162949f0e10a9edd02e3913d8454500"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
sched_setattr(0x0, 0x0, 0x0)

16:46:30 executing program 5:
r0 = add_key(&(0x7f0000000680)='.dead\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="76ee75cc8e631a4af2920b2ac9cc88243c810ddca3dbadeb888244911c2dce83ac77101375908f0cf24a26c20f1fbda903084eb665114cceae58499be6a74b79059d7821145f66be25", 0x49, 0xfffffffffffffffd)
request_key(&(0x7f0000000800)='encrypted\x00', &(0x7f0000000840)={'syz', 0x3}, &(0x7f00000009c0)=':chain\x00', r0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f00000006c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'})
r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082)
r2 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c)
ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f00000007c0))
sendmsg$nl_generic(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYBLOB="64a9de076dca0e8605a31cef3ab1a5cd02377f28908d669b991d76740dadc3f5a3b7c0b3b172f911f68412b81c29ab57624c32bff42e05b50cbf6e03a74142de293129e7115e6638b1343cdcb16285e3fe0f374f9b76087fd4802c0000003d311688365b184052d1d7a52266025b56aa0d76afe4624740dd26c9ca9f273e2f93815f17000000fd8f6e9673d110e6f5ec486d030c1bab7b0000"], 0x2}, 0x1, 0x0, 0x0, 0x4048024}, 0x4000081)
syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x105000)
pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff)
write(0xffffffffffffffff, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13)
sendto$packet(r3, &(0x7f0000000240)="8c6afbc18295209d3afd2fdfa79f0b5dff7fa7f9745afe84b0e3064767e50f60a2d6b11d85967d31afaed05441e3605647bc0e7e209596824ddcf166c92999088280229a0ff4f172a00ccb4ac0965ad1e16ce1b3731291c1342e6b7a84285c2ce01ff376432225b320daa46f2fe7785c581f1abfb49337c33a5e9835de9d19f3af72c04f7b9a559807aa4bad25ba1522a02aca6fbd2a57da241f8b948953d367f8268f1bf76792dcbb2b5f3444bdb18a68a68b05b47dc0b04488d35a9e0a6febd6a9c5e16a7c5ac8f2eafa95b9f7ab4e778ae3d2872200ed1b135ee5fa", 0xdd, 0x4000, &(0x7f0000000400)={0x11, 0xf6, 0x0, 0x1, 0xfe, 0x6, @random="2e1700"}, 0x14)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r1, 0x0, 0x40fdf)
r4 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$KVM_NMI(r4, 0xae9a)
r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7}, 0xc)
setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x3]}, 0x5c)

16:46:30 executing program 2:
r0 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r1=>0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r1, 0x0)
r2 = semget$private(0x0, 0x20000000102, 0x0)
semop(r2, &(0x7f0000000180)=[{}], 0x1)

16:46:30 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00\x00\x00\x06\x10\x00', 0x420000015001})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup3(r2, r1, 0x0)
ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'})
close(r0)

[ 1159.997667] kauditd_printk_skb: 171 callbacks suppressed
[ 1159.997684] audit: type=1400 audit(1577724390.815:14720): avc:  denied  { map } for  pid=26484 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:31 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)

[ 1160.211068] audit: type=1400 audit(1577724390.875:14721): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1160.481515] audit: type=1400 audit(1577724390.915:14722): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1160.671014] audit: type=1400 audit(1577724390.955:14723): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:31 executing program 4:
futex(&(0x7f000000cffc)=0x8080000000000004, 0x80000000000b, 0x4, 0x0, &(0x7f0000000040), 0x0)
futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000000000), 0x0)

[ 1160.964910] audit: type=1400 audit(1577724390.955:14724): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:31 executing program 2:
socket(0x10, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080))
openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x40000, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x339)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
io_setup(0x0, &(0x7f00000001c0))
getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x802, 0x0)
write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24)
getsockname(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast2, @in=@local}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xfffffe23)
pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000700)=ANY=[], 0x0, 0x1)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
splice(r2, 0x0, r1, 0x0, 0x20000038, 0x0)
write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x2}, 0x7)

[ 1161.245459] audit: type=1400 audit(1577724391.035:14725): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:32 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)

16:46:32 executing program 3:
r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0)
write(r0, &(0x7f0000000040)="0600", 0x2)
write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000300000000000000000005007c00000000000000280000000000d4e34ba67f6ebd451a22dec4c83108206624ca7a4f9d38e16565816eb68ca2229428aa5a5282ff43ba0c2b77d868c0757da79288e04d070051f4250c50a90d78c71bda26da6a82cd52dd2d76293b3b3227c729dd5e6e5c22e6be459729a42093eb3d7f774607000000ae21bf460be085c86d383a064ea312ba66db4ce4943c4b4d41c97ed370c68287b2e940eb689162949f0e10a9edd02e3913d8454500"], 0x1c)
sendfile(r0, r0, &(0x7f0000001000), 0xffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10)
sched_setattr(0x0, 0x0, 0x0)

[ 1161.473125] audit: type=1400 audit(1577724391.055:14726): avc:  denied  { map } for  pid=26484 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1161.770745] audit: type=1400 audit(1577724391.075:14727): avc:  denied  { map } for  pid=26490 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1161.909001] audit: type=1400 audit(1577724391.085:14728): avc:  denied  { map } for  pid=26490 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1162.096096] audit: type=1400 audit(1577724391.105:14729): avc:  denied  { map } for  pid=26490 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:33 executing program 5:
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0)
bind$rds(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2000000000000021, 0x2, 0x10000000000002)
connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24)
sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000)
recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)

16:46:33 executing program 2:
socket(0x10, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080))
openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x40000, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x339)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
io_setup(0x0, &(0x7f00000001c0))
getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x802, 0x0)
write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24)
getsockname(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast2, @in=@local}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xfffffe23)
pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000700)=ANY=[], 0x0, 0x1)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
splice(r2, 0x0, r1, 0x0, 0x20000038, 0x0)
write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x2}, 0x7)

16:46:33 executing program 4:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

16:46:33 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOBLANK(r0, 0x4611, 0x4)
r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x107002, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000001c0)={0x2, 0xc, 0x13, "5975c0e544ff7cc601c55d547cce0849bbb37cf575ca733b74ce60b59f380d2f188cf58fb3ea2969d1df44092d3cdcc61930509cbef22caf20163024", 0x20, "38e7999150e098b02d87a7a2875fae44df93f97f9795ce5ab3091fc4e7b681fa05f7e1bfc4702cc13352afeee25cce7bb8c33de094b8430f1dbd67bc", 0x80})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r3=>0x0)
openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x200002, 0x0)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
sched_setaffinity(r3, 0x8, &(0x7f0000000080)=0x9)
perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0xcf11de83009d5587)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105518, &(0x7f0000001000))

16:46:33 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)

16:46:34 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0)
ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @vbi={0x0, 0x0, 0x3132564e}})

16:46:34 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
dup3(r0, r1, 0x80000)

16:46:34 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOBLANK(r0, 0x4611, 0x4)
r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x107002, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000001c0)={0x2, 0xc, 0x13, "5975c0e544ff7cc601c55d547cce0849bbb37cf575ca733b74ce60b59f380d2f188cf58fb3ea2969d1df44092d3cdcc61930509cbef22caf20163024", 0x20, "38e7999150e098b02d87a7a2875fae44df93f97f9795ce5ab3091fc4e7b681fa05f7e1bfc4702cc13352afeee25cce7bb8c33de094b8430f1dbd67bc", 0x80})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r3=>0x0)
openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x200002, 0x0)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
sched_setaffinity(r3, 0x8, &(0x7f0000000080)=0x9)
perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0xcf11de83009d5587)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105518, &(0x7f0000001000))

16:46:34 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r0, r1, 0x0, 0x0, 0x0}, 0x30)
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, '\x00\x00\x00\x00\x00\x04\x96O\x93~\xb5\x00', 0x5}, 0x18)
r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0)
ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, 0x0)

16:46:34 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b704000010000020620700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253fc41d4b779c3730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa9e4511ad4d0497c068766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e55155805b35edc5303dc829a081f62654929347d56e35531fc3ae91a3c61c8d8333f579f3b56afb24d3d073c7918bd6d0c71d9b33a238ab8dcfbd6f43a7119e28d67ddac5bfca02d30b566cb82e576d09a9bff3d6d8ef5ab61f9db10"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48)

16:46:34 executing program 2:
socket(0x10, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080))
openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x40000, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x339)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
io_setup(0x0, &(0x7f00000001c0))
getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x802, 0x0)
write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24)
getsockname(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast2, @in=@local}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xfffffe23)
pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000700)=ANY=[], 0x0, 0x1)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
splice(r2, 0x0, r1, 0x0, 0x20000038, 0x0)
write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x2}, 0x7)

16:46:34 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)

16:46:35 executing program 4:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

16:46:35 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOBLANK(r0, 0x4611, 0x4)
r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x107002, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000001c0)={0x2, 0xc, 0x13, "5975c0e544ff7cc601c55d547cce0849bbb37cf575ca733b74ce60b59f380d2f188cf58fb3ea2969d1df44092d3cdcc61930509cbef22caf20163024", 0x20, "38e7999150e098b02d87a7a2875fae44df93f97f9795ce5ab3091fc4e7b681fa05f7e1bfc4702cc13352afeee25cce7bb8c33de094b8430f1dbd67bc", 0x80})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r3=>0x0)
openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x200002, 0x0)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
sched_setaffinity(r3, 0x8, &(0x7f0000000080)=0x9)
perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0xcf11de83009d5587)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105518, &(0x7f0000001000))

16:46:35 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48)

[ 1165.031254] kauditd_printk_skb: 170 callbacks suppressed
[ 1165.031272] audit: type=1400 audit(1577724395.845:14900): avc:  denied  { map } for  pid=26561 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:36 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r0, r1, 0x0, 0x0, 0x0}, 0x30)
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, '\x00\x00\x00\x00\x00\x04\x96O\x93~\xb5\x00', 0x5}, 0x18)
r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0)
ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, 0x0)

[ 1165.258155] audit: type=1400 audit(1577724395.845:14901): avc:  denied  { map } for  pid=26561 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:36 executing program 0:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

[ 1165.469563] audit: type=1400 audit(1577724395.855:14902): avc:  denied  { map } for  pid=26563 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:36 executing program 2:
socket(0x10, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080))
openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x40000, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x339)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
io_setup(0x0, &(0x7f00000001c0))
getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x14)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x802, 0x0)
write(r0, &(0x7f00000000c0)="24000000210025f0075c0165ff0ffc0e020000000010000002e1100c08000a0000000000", 0x24)
getsockname(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast2, @in=@local}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xfffffe23)
pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00')
fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000700)=ANY=[], 0x0, 0x1)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
splice(r2, 0x0, r1, 0x0, 0x20000038, 0x0)
write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x2}, 0x7)

[ 1165.633083] audit: type=1400 audit(1577724395.855:14903): avc:  denied  { map } for  pid=26563 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1165.812485] audit: type=1400 audit(1577724395.895:14904): avc:  denied  { map } for  pid=26558 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1165.975388] audit: type=1400 audit(1577724395.895:14905): avc:  denied  { prog_run } for  pid=26559 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1
[ 1166.105364] audit: type=1400 audit(1577724395.935:14906): avc:  denied  { map } for  pid=26563 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:37 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$FBIOBLANK(r0, 0x4611, 0x4)
r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0)
r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x107002, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000001c0)={0x2, 0xc, 0x13, "5975c0e544ff7cc601c55d547cce0849bbb37cf575ca733b74ce60b59f380d2f188cf58fb3ea2969d1df44092d3cdcc61930509cbef22caf20163024", 0x20, "38e7999150e098b02d87a7a2875fae44df93f97f9795ce5ab3091fc4e7b681fa05f7e1bfc4702cc13352afeee25cce7bb8c33de094b8430f1dbd67bc", 0x80})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r3=>0x0)
openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x200002, 0x0)
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
sched_setaffinity(r3, 0x8, &(0x7f0000000080)=0x9)
perf_event_open(&(0x7f0000001000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0xcf11de83009d5587)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105518, &(0x7f0000001000))

16:46:37 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48)

[ 1166.249585] audit: type=1400 audit(1577724395.935:14907): avc:  denied  { map } for  pid=26563 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:37 executing program 4:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

[ 1166.446209] audit: type=1400 audit(1577724395.955:14908): avc:  denied  { map } for  pid=26558 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:37 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r0, r1, 0x0, 0x0, 0x0}, 0x30)
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, '\x00\x00\x00\x00\x00\x04\x96O\x93~\xb5\x00', 0x5}, 0x18)
r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0)
ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, 0x0)

[ 1166.649423] audit: type=1400 audit(1577724396.445:14909): avc:  denied  { map } for  pid=26576 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:37 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

16:46:38 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48)

16:46:38 executing program 1:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000380)={@random="31dd9638e37f", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "730200", 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x8]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x21}}}}}}}, 0x0)

16:46:38 executing program 0:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

16:46:38 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r0, r1, 0x0, 0x0, 0x0}, 0x30)
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, '\x00\x00\x00\x00\x00\x04\x96O\x93~\xb5\x00', 0x5}, 0x18)
r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0)
ioctl$SG_EMULATED_HOST(r3, 0xc0347c03, 0x0)

16:46:39 executing program 4:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

16:46:39 executing program 1:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000380)={@random="31dd9638e37f", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "730200", 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x8]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x21}}}}}}}, 0x0)

16:46:39 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xff44)
recvmmsg(r1, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000640)=""/227, 0xe3}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000001bc0)=@ipx, 0x80, 0x0}, 0x4}], 0x2, 0x0, 0x0)

16:46:40 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

16:46:40 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
move_pages(0x0, 0x6, &(0x7f0000000080)=[&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil], 0x0, &(0x7f0000000180), 0x0)

16:46:40 executing program 1:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000380)={@random="31dd9638e37f", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "730200", 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x8]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x21}}}}}}}, 0x0)

[ 1170.040710] kauditd_printk_skb: 187 callbacks suppressed
[ 1170.040726] audit: type=1400 audit(1577724400.855:15097): avc:  denied  { map } for  pid=26644 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:41 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

16:46:41 executing program 0:
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe)
r0 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0)
r1 = socket$inet(0x2, 0x4000000805, 0x0)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
dup3(r1, r2, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x1, [<r3=>0x0]}, &(0x7f0000a8a000)=0x8)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x0, 0xff, 0x93, 0x1, 0x141, 0x0, 0x3}, 0x0)
setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0)
r4 = socket(0x400000000010, 0x3, 0x0)
write(r4, &(0x7f0000000000)="2400000018002551075c0165ff0ffc021c14020000100f0504e1000c0800160000000000", 0x24)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4)
mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
socket(0x400000000010, 0x0, 0x0)
fcntl$setstatus(r5, 0x4, 0x6100)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfff9, 0x0, 0x0, 0x7}]}, 0x10)
ftruncate(r5, 0x8200)
renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00', 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x100)
r6 = socket$inet(0x2, 0x4000000805, 0x0)
r7 = socket$inet_sctp(0x2, 0x5, 0x84)
r8 = dup3(r6, r7, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10)
sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000480), 0x0)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000080), 0x14)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300), 0x8)
sendfile(r0, r0, &(0x7f00000001c0), 0xa198)
syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x20, 0x86102)

[ 1170.223692] audit: type=1804 audit(1577724400.865:15098): pid=26630 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir773859160/syzkaller.casMX4/153/bus" dev="sda1" ino=17384 res=1
[ 1170.566205] audit: type=1400 audit(1577724400.865:15099): avc:  denied  { map } for  pid=26650 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1170.657223] audit: type=1400 audit(1577724400.895:15100): avc:  denied  { map } for  pid=26650 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1170.707223] audit: type=1400 audit(1577724400.895:15101): avc:  denied  { map } for  pid=26644 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1170.934247] audit: type=1400 audit(1577724400.895:15102): avc:  denied  { map } for  pid=26644 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:41 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

[ 1171.109880] audit: type=1400 audit(1577724400.915:15103): avc:  denied  { map } for  pid=26650 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:42 executing program 1:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000380)={@random="31dd9638e37f", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "730200", 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x8]}, @local, {[], @gre={{0x0, 0x501, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x21}}}}}}}, 0x0)

16:46:42 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

[ 1171.286872] audit: type=1400 audit(1577724400.915:15104): avc:  denied  { map } for  pid=26650 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:42 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

[ 1171.524659] audit: type=1400 audit(1577724400.965:15105): avc:  denied  { map } for  pid=26650 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1171.693162] audit: type=1400 audit(1577724400.975:15106): avc:  denied  { map } for  pid=26652 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:43 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

16:46:43 executing program 1:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

16:46:44 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

16:46:44 executing program 0:
syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xc0, 0x0)
syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)

16:46:45 executing program 3:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

16:46:45 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

16:46:45 executing program 0:
syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xc0, 0x0)
syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)

16:46:45 executing program 1:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

16:46:45 executing program 5:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x11)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)
setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14)

[ 1175.079812] kauditd_printk_skb: 144 callbacks suppressed
[ 1175.079829] audit: type=1804 audit(1577724405.895:15252): pid=26690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir205853878/syzkaller.gwGhFB/179/bus" dev="sda1" ino=16859 res=1
[ 1175.262388] audit: type=1400 audit(1577724405.865:15251): avc:  denied  { map } for  pid=26723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1175.572814] audit: type=1400 audit(1577724405.975:15253): avc:  denied  { map } for  pid=26723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

[ 1175.689413] audit: type=1400 audit(1577724405.975:15254): avc:  denied  { map } for  pid=26723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1175.921647] audit: type=1400 audit(1577724405.975:15255): avc:  denied  { map } for  pid=26723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:46 executing program 3:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

[ 1176.155893] audit: type=1400 audit(1577724406.035:15256): avc:  denied  { map } for  pid=26726 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1176.496998] audit: type=1400 audit(1577724406.035:15257): avc:  denied  { map } for  pid=26723 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1176.573482] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1176.618116] audit: audit_lost=87 audit_rate_limit=0 audit_backlog_limit=64
[ 1176.659994] audit: backlog limit exceeded
16:46:47 executing program 0:
syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xc0, 0x0)
syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)

16:46:47 executing program 5:
timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
r0 = socket(0x40000000015, 0x5, 0x0)
recvmsg$can_raw(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
dup2(r1, r2)
dup2(r2, r0)
r3 = getpid()
timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0)
r4 = socket$inet6(0xa, 0x803, 0x100000000000002)
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
tkill(r3, 0x800000015)

16:46:48 executing program 1:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

16:46:48 executing program 0:
syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0xc0, 0x0)
syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2)
openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0)

16:46:49 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

16:46:49 executing program 3:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

16:46:49 executing program 5:
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd})
msgsnd(r0, &(0x7f0000001680)=ANY=[@ANYBLOB="03"], 0x1, 0x0)
msgctl$IPC_RMID(r0, 0x0)

16:46:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00')
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00')
syz_open_procfs(0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x42041, 0x0)
close(r1)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8}, 0x10)
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18)
syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00')
socket(0x10, 0x2, 0x0)
gettid()
socket$inet6(0xa, 0x5, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600))
r4 = socket(0x10, 0x0, 0x0)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
setresuid(0x0, 0x0, 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700))
r5 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540))
getresgid(0x0, 0x0, &(0x7f0000000600))
r6 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
lstat(&(0x7f00000006c0)='./file0\x00', 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
setresuid(0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0)
syz_open_dev$swradio(0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x0)
open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
socket(0x0, 0x2, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0)
getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000080))

16:46:50 executing program 3:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

16:46:50 executing program 0:
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x22201, 0x0)
write$P9_RWRITE(r0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000640)=0x8)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x8, 0x7308, 0x2}, &(0x7f00000006c0)=0x10)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r1, &(0x7f0000000140), 0x10)
setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258)
close(r1)

16:46:50 executing program 5:
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd})
msgsnd(r0, &(0x7f0000001680)=ANY=[@ANYBLOB="03"], 0x1, 0x0)
msgctl$IPC_RMID(r0, 0x0)

[ 1180.109675] kauditd_printk_skb: 223 callbacks suppressed
[ 1180.109692] audit: type=1400 audit(1577724410.925:15476): avc:  denied  { map } for  pid=26799 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1180.291925] audit: type=1400 audit(1577724410.945:15477): avc:  denied  { map } for  pid=26799 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:51 executing program 2:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r0 = getpid()
tkill(r0, 0x9)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r1 = getpid()
tkill(r1, 0x9)

[ 1180.439043] audit: type=1400 audit(1577724410.965:15478): avc:  denied  { map } for  pid=26802 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1180.572124] audit: type=1400 audit(1577724410.965:15479): avc:  denied  { map } for  pid=26799 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:51 executing program 5:
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd})
msgsnd(r0, &(0x7f0000001680)=ANY=[@ANYBLOB="03"], 0x1, 0x0)
msgctl$IPC_RMID(r0, 0x0)

[ 1180.796726] audit: type=1400 audit(1577724410.975:15480): avc:  denied  { map } for  pid=26795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:51 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0)
pkey_alloc(0x0, 0x2)
ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000002340))
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3)
write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_CREATE(r0, 0x5501)

[ 1180.852995] audit: type=1400 audit(1577724410.985:15481): avc:  denied  { map } for  pid=26795 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1181.041429] audit: type=1400 audit(1577724410.995:15482): avc:  denied  { map } for  pid=26801 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:51 executing program 1:
timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r0=>0x0})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={<r1=>0xffffffffffffffff})
r2 = socket(0x11, 0xa, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0)
r4 = gettid()
r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000180)=""/223, 0x4}], 0x1, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2Y\x00\x00\x00_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0)
tkill(r4, 0x1000000000014)

[ 1181.170500] audit: type=1400 audit(1577724410.995:15483): avc:  denied  { map } for  pid=26801 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:52 executing program 2:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r0 = getpid()
tkill(r0, 0x9)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r1 = getpid()
tkill(r1, 0x9)

[ 1181.320135] audit: type=1400 audit(1577724411.005:15484): avc:  denied  { map } for  pid=26799 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1181.531372] audit: type=1400 audit(1577724411.005:15485): avc:  denied  { map } for  pid=26801 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:52 executing program 5:
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd})
msgsnd(r0, &(0x7f0000001680)=ANY=[@ANYBLOB="03"], 0x1, 0x0)
msgctl$IPC_RMID(r0, 0x0)

16:46:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = fcntl$dupfd(r0, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100))

16:46:52 executing program 0:
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x22201, 0x0)
write$P9_RWRITE(r0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000640)=0x8)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x8, 0x7308, 0x2}, &(0x7f00000006c0)=0x10)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r1, &(0x7f0000000140), 0x10)
setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258)
close(r1)

16:46:53 executing program 2:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r0 = getpid()
tkill(r0, 0x9)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r1 = getpid()
tkill(r1, 0x9)

16:46:53 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x38}}, 0x0)

16:46:53 executing program 3:
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0)
splice(r1, 0x0, r0, 0x0, 0x20000038, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = fcntl$dupfd(r2, 0x0, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
write$FUSE_DIRENTPLUS(r1, &(0x7f0000000200)={0x10, 0x0, 0x1}, 0x10)

16:46:53 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)=""/125)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0)
write$nbd(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="674466980000d6c62d0524734a0001000000ba4493c00b661f36bc692339bcaf85a5be92937bd600000000000000"], 0x2e)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
r4 = socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68+0\x99\x14k^nBx\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r5, 0x200004)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000040)={0x9, 0x4, 0x1, {0x77359400}, 0x42cf, 0x6})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$caif_seqpacket(0x25, 0x5, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00')
preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0xe75b73604b9cd6d5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
sendfile(r0, r5, 0x0, 0x80001d00c0d0)

16:46:53 executing program 5:
socket$inet(0x10, 0x2, 0x0)
epoll_create1(0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
creat(&(0x7f0000000400)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r0, 0x202002)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
keyctl$chown(0x4, r0, r2, 0x0)
keyctl$chown(0xb, r0, 0x0, 0x0)
r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$setperm(0x5, r3, 0x202002)
keyctl$chown(0x4, r3, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r4 = socket(0x10, 0x803, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r6 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2)
ioctl$VIDIOC_CREATE_BUFS(r6, 0xc100565c, &(0x7f0000000440)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}})
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@local, @dev, @rand_addr="fc5400000000000092c2fe4cbc2929db", 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, r5})
r7 = socket$inet6(0xa, 0x2, 0x0)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffc7}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0100000000000000280012000c0001007665746800000000ececfac5e025573fb5926c7ae92af81800020814a79f7488f611d01cb85041b7f809000000004600006df0840107d3c3bc1747ef4939dd822dafd6037136a70f304dbcdee66ed673df5c98c00033e06a14e3b513ef72364106b249dd59b35aafee80aa0a9b2e3bbfb4941d2ed7d7fc3c3dae0a3a354339e3572311b364ba77c4e343d199812b3862a78324fd19d159913729e3afec87ff2f99746c2aed6d90fff50cc840f622b17a4a827b1a75", @ANYRES32=0x0, @ANYBLOB="0000df0a20eb0007"], 0x48}}, 0x0)
ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000080)={@loopback, @rand_addr="b8594fb7a2c0a5845a4833d9d3289ec6", @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e0108, r11})
ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000140)={@local, @dev, @rand_addr="fc5400000000000092c2fe4cbc2929db", 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, r11})

16:46:54 executing program 2:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r0 = getpid()
tkill(r0, 0x9)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
r1 = getpid()
tkill(r1, 0x9)

16:46:54 executing program 4:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='autofs\x00', 0x0, 0x0)

16:46:54 executing program 0:
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x22201, 0x0)
write$P9_RWRITE(r0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000640)=0x8)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x8, 0x7308, 0x2}, &(0x7f00000006c0)=0x10)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r1, &(0x7f0000000140), 0x10)
setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f1ba2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258)
close(r1)

16:46:54 executing program 3:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write(r1, &(0x7f00000001c0), 0xfffffef3)
r2 = epoll_create1(0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58)
accept4(r3, 0x0, 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000240)={0x0, <r4=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0)
open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

16:46:55 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0xe)
ioctl$TCFLSH(r2, 0x80047437, 0x71c000)

[ 1184.227719] autofs4:pid:26884:autofs_fill_super: called with bogus options
[ 1184.312441] autofs4:pid:26888:autofs_fill_super: called with bogus options
[ 1184.343943] device nr0 entered promiscuous mode
[ 1184.389145] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
16:46:55 executing program 4:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='autofs\x00', 0x0, 0x0)

[ 1184.617506] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready
16:46:55 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000000100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000055781309e339be593f7710aa00ffe8001700410000"], 0x70}}, 0x0)
sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0)

[ 1184.918354] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 1184.969468] IPv6: ADDRCONF(NETDEV_UP): veth5: link is not ready
16:46:55 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0)

[ 1185.124975] kauditd_printk_skb: 172 callbacks suppressed
[ 1185.124991] audit: type=1400 audit(1577724415.935:15657): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.175580] audit: type=1400 audit(1577724415.955:15658): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.201980] audit: type=1400 audit(1577724415.995:15659): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.272219] audit: type=1400 audit(1577724415.995:15660): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:56 executing program 3:
creat(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
pivot_root(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'ra\n\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2, 0x3, 0x1f8, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x160, 0x160, 0x160, 0x160, 0x160, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x02\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
utime(0x0, &(0x7f0000000180)={0x9})

[ 1185.405328] audit: type=1400 audit(1577724416.075:15661): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.453827] autofs4:pid:26907:autofs_fill_super: called with bogus options
[ 1185.532889] audit: type=1400 audit(1577724416.085:15662): avc:  denied  { map } for  pid=26903 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:56 executing program 4:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='autofs\x00', 0x0, 0x0)

[ 1185.685271] audit: type=1400 audit(1577724416.295:15663): avc:  denied  { map } for  pid=26908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.796445] audit: type=1400 audit(1577724416.305:15664): avc:  denied  { map } for  pid=26908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1185.938680] audit: type=1400 audit(1577724416.325:15665): avc:  denied  { map } for  pid=26908 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1186.065487] audit: type=1400 audit(1577724416.325:15666): avc:  denied  { map } for  pid=26908 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:46:57 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0)

16:46:57 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)=""/125)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0)
write$nbd(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="674466980000d6c62d0524734a0001000000ba4493c00b661f36bc692339bcaf85a5be92937bd600000000000000"], 0x2e)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
r4 = socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68+0\x99\x14k^nBx\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r5, 0x200004)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000040)={0x9, 0x4, 0x1, {0x77359400}, 0x42cf, 0x6})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$caif_seqpacket(0x25, 0x5, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00')
preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0xe75b73604b9cd6d5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
sendfile(r0, r5, 0x0, 0x80001d00c0d0)

16:46:57 executing program 0:
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x22201, 0x0)
write$P9_RWRITE(r0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000640)=0x8)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000680)={0x0, 0x8, 0x7308, 0x2}, &(0x7f00000006c0)=0x10)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r1, &(0x7f0000000140), 0x10)
setsockopt(r1, 0x65, 0x1, &(0x7f0000000700)="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", 0x258)
close(r1)

16:46:57 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0)
umount2(&(0x7f0000000200)='./file0\x00', 0xb)

16:46:57 executing program 3:
creat(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
pivot_root(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'ra\n\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2, 0x3, 0x1f8, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x160, 0x160, 0x160, 0x160, 0x160, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x02\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
utime(0x0, &(0x7f0000000180)={0x9})

[ 1186.627591] autofs4:pid:26922:autofs_fill_super: called with bogus options
16:46:57 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0)

16:46:57 executing program 4:
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='autofs\x00', 0x0, 0x0)

16:46:58 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0)

16:46:58 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0)
umount2(&(0x7f0000000200)='./file0\x00', 0xb)

[ 1188.023125] autofs4:pid:26952:autofs_fill_super: called with bogus options
16:46:59 executing program 3:
creat(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
pivot_root(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'ra\n\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2, 0x3, 0x1f8, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x160, 0x160, 0x160, 0x160, 0x160, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x02\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
utime(0x0, &(0x7f0000000180)={0x9})

[ 1188.375707] device nr0 entered promiscuous mode
16:46:59 executing program 0:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0)
r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x3c)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r2 = dup(r1)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00')
fchdir(r3)
write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x0, {}, 0xcb}}, 0x11e)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_targets\x00')

16:46:59 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd)
write(r0, &(0x7f0000000040)="e0", 0xfffffe00)
ioctl$TIOCVHANGUP(r0, 0x5437, 0x0)
ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfffff801, 0xa, 0x4, 0x4000, 0x401, {0x77359400}, {0x5, 0x0, 0xf9, 0x10, 0x0, 0x6, "ca2beb94"}, 0x80000001, 0x1, @offset=0x4, 0x6})

16:46:59 executing program 5:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[ 1190.239062] kauditd_printk_skb: 177 callbacks suppressed
[ 1190.239078] audit: type=1400 audit(1577724421.055:15844): avc:  denied  { map } for  pid=26982 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1190.306127] audit: type=1400 audit(1577724421.095:15845): avc:  denied  { map } for  pid=26982 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:01 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)=""/125)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0)
write$nbd(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="674466980000d6c62d0524734a0001000000ba4493c00b661f36bc692339bcaf85a5be92937bd600000000000000"], 0x2e)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
r4 = socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68+0\x99\x14k^nBx\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r5, 0x200004)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000040)={0x9, 0x4, 0x1, {0x77359400}, 0x42cf, 0x6})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$caif_seqpacket(0x25, 0x5, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00')
preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0xe75b73604b9cd6d5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
sendfile(r0, r5, 0x0, 0x80001d00c0d0)

16:47:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd)
write(r0, &(0x7f0000000040)="e0", 0xfffffe00)
ioctl$TIOCVHANGUP(r0, 0x5437, 0x0)
ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfffff801, 0xa, 0x4, 0x4000, 0x401, {0x77359400}, {0x5, 0x0, 0xf9, 0x10, 0x0, 0x6, "ca2beb94"}, 0x80000001, 0x1, @offset=0x4, 0x6})

16:47:01 executing program 3:
creat(0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
pivot_root(0x0, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'ra\n\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2, 0x3, 0x1f8, 0x0, 0x0, 0xb0, 0x0, 0xb0, 0x160, 0x160, 0x160, 0x160, 0x160, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x02\x00'}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x258)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
utime(0x0, &(0x7f0000000180)={0x9})

16:47:01 executing program 0:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

16:47:01 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0)
umount2(&(0x7f0000000200)='./file0\x00', 0xb)

[ 1190.406345] audit: type=1400 audit(1577724421.095:15846): avc:  denied  { map } for  pid=26982 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1190.534349] audit: type=1400 audit(1577724421.095:15847): avc:  denied  { map } for  pid=26982 comm="sh" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:01 executing program 5:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[ 1190.718024] audit: type=1400 audit(1577724421.105:15848): avc:  denied  { map } for  pid=26982 comm="sh" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd)
write(r0, &(0x7f0000000040)="e0", 0xfffffe00)
ioctl$TIOCVHANGUP(r0, 0x5437, 0x0)
ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfffff801, 0xa, 0x4, 0x4000, 0x401, {0x77359400}, {0x5, 0x0, 0xf9, 0x10, 0x0, 0x6, "ca2beb94"}, 0x80000001, 0x1, @offset=0x4, 0x6})

[ 1190.948354] audit: type=1400 audit(1577724421.115:15849): avc:  denied  { map } for  pid=26982 comm="sh" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1191.097801] audit: type=1400 audit(1577724421.145:15850): avc:  denied  { create } for  pid=26980 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 1191.281775] audit: type=1400 audit(1577724421.155:15851): avc:  denied  { write } for  pid=26980 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
16:47:02 executing program 0:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

[ 1191.441386] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1191.449690] audit: audit_backlog=65 > audit_backlog_limit=64
16:47:02 executing program 3:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

[ 1192.213188] device nr0 entered promiscuous mode
16:47:03 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd)
write(r0, &(0x7f0000000040)="e0", 0xfffffe00)
ioctl$TIOCVHANGUP(r0, 0x5437, 0x0)
ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0xfffff801, 0xa, 0x4, 0x4000, 0x401, {0x77359400}, {0x5, 0x0, 0xf9, 0x10, 0x0, 0x6, "ca2beb94"}, 0x80000001, 0x1, @offset=0x4, 0x6})

16:47:03 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x80000, 0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, 0x0)
umount2(&(0x7f0000000200)='./file0\x00', 0xb)

16:47:03 executing program 5:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

16:47:04 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132})
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)=""/125)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0)
write$nbd(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="674466980000d6c62d0524734a0001000000ba4493c00b661f36bc692339bcaf85a5be92937bd600000000000000"], 0x2e)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
r4 = socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68+0\x99\x14k^nBx\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
r5 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0)
ftruncate(r5, 0x200004)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000040)={0x9, 0x4, 0x1, {0x77359400}, 0x42cf, 0x6})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$caif_seqpacket(0x25, 0x5, 0x1)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00')
preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0xe75b73604b9cd6d5, 0x0)
r7 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r7, 0x0, r7)
sendfile(r0, r5, 0x0, 0x80001d00c0d0)

16:47:04 executing program 4:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

16:47:04 executing program 3:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

16:47:04 executing program 0:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

16:47:04 executing program 2:
quotactl(0x2080000202, &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000200)='/')

16:47:05 executing program 5:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

16:47:05 executing program 2:
quotactl(0x2080000202, &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000200)='/')

16:47:05 executing program 3:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

16:47:05 executing program 0:
socket$inet(0x2, 0x0, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
shutdown(r0, 0x1)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "4a606febfa36799f", "4103bc3153afd600d7d4b48a6b4e46ae", "c7a07949", "387f388767c306c4"}, 0x28)
sendto$inet6(r0, &(0x7f0000000240)='\a', 0x1, 0x4000, 0x0, 0x0)

[ 1195.273267] kauditd_printk_skb: 306 callbacks suppressed
[ 1195.273284] audit: type=1400 audit(1577724426.085:16145): avc:  denied  { map } for  pid=27065 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:06 executing program 4:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[ 1195.456207] audit: type=1400 audit(1577724426.175:16146): avc:  denied  { map } for  pid=27065 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1195.585284] audit: type=1400 audit(1577724426.175:16147): avc:  denied  { map } for  pid=27065 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1195.774094] audit: type=1400 audit(1577724426.175:16148): avc:  denied  { map } for  pid=27065 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1195.921286] audit: type=1400 audit(1577724426.195:16149): avc:  denied  { map } for  pid=27066 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1195.999568] device nr0 entered promiscuous mode
16:47:06 executing program 2:
quotactl(0x2080000202, &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000200)='/')

[ 1196.062788] audit: type=1400 audit(1577724426.195:16150): avc:  denied  { map } for  pid=27066 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1196.205422] audit: type=1400 audit(1577724426.195:16151): avc:  denied  { map } for  pid=27066 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1196.317714] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1196.367910] audit: audit_lost=95 audit_rate_limit=0 audit_backlog_limit=64
[ 1196.390410] audit: type=1400 audit(1577724426.195:16152): avc:  denied  { map } for  pid=27066 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:07 executing program 3:
r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2)
ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x0, {0xc, @vbi}})

16:47:08 executing program 4:
r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, <r2=>0x0}, &(0x7f0000000280)=0x5)
setuid(r2)
ustat(0x2, &(0x7f0000000040))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x800, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={<r5=>0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc)
setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000680)={r5, @rand_addr=0x5, @rand_addr=0xff800}, 0xffffffffffffffb8)
r6 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r7=>0x0})
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xc0100}, 0xc, &(0x7f0000000740)={&(0x7f0000000880)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bc000200400001002400f50070c0280452697479000000000000000000000000000000000000000000000000080003000e00000008349e48d781f1f1000400018ea5c60e8930ad41740bcf4e8c5332d1a79d18", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0200000000000000180012000800b0e69bd94a8cc80100767469000c0002000800010172b183abb9a855a1cf9936e4520d10f95b88b6f20a943d900716795dec59a738f51fba6c0250ebfd9be6", @ANYRESDEC=r11], 0x4}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0)
r12 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r12, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4)
getsockname$packet(r12, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000029c0)=0x14)
r13 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r13, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r13, &(0x7f0000005b40), 0x400000000000122, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f0000002a00)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@dev, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000002b40)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f00000077c0)=[{{&(0x7f0000002b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/99, 0x63}, {&(0x7f0000003c80)=""/70, 0x46}], 0x3, &(0x7f0000003d40)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000004dc0)=""/72, 0x48}, {&(0x7f0000004e40)=""/78, 0x4e}, {&(0x7f0000004ec0)=""/218, 0xda}, {&(0x7f0000004fc0)=""/4096, 0x1000}, {&(0x7f0000005fc0)=""/4096, 0x1000}], 0x5}, 0x3f}, {{&(0x7f0000007040)=@hci, 0x80, &(0x7f0000007380)=[{&(0x7f00000070c0)=""/44, 0x2c}, {&(0x7f0000007100)=""/142, 0x8e}, {&(0x7f00000071c0)=""/127, 0x7f}, {&(0x7f0000007240)}, {&(0x7f0000007280)=""/186, 0xba}, {&(0x7f0000007340)}], 0x6}, 0x3}, {{&(0x7f0000007400)=@ipx, 0x80, &(0x7f0000007740)=[{&(0x7f0000007480)=""/5, 0x5}, {&(0x7f00000074c0)=""/232, 0xe8}, {&(0x7f00000075c0)=""/196, 0xc4}, {&(0x7f00000076c0)=""/96, 0x60}], 0x4, &(0x7f0000007780)=""/54, 0x36}, 0x7ff}], 0x4, 0x100, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, <r14=>0xffffffffffffffff})
r15 = dup(r14)
ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

16:47:08 executing program 0:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x80002, 0x0)
close(r0)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0))
sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0)
syz_open_dev$video(&(0x7f0000001800)='/dev/video#\x00', 0x0, 0x0)
socket$alg(0x26, 0x5, 0x0)

16:47:08 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x0, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x77})
ptrace$setopts(0x4206, r4, 0x0, 0x0)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffe9c}, {&(0x7f0000000140)=""/64, 0xfffffffffffffdbe}], 0x3, 0x0, 0x0, 0x0)
tkill(r4, 0x3c)
ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080))
ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000180)={0x505340e3, 0x0, 0x0, 0xffff8001, 0x11, "3b0b3bba022be4e7dcac7ee3cdc584eef4ca9e"})
ptrace$cont(0x9, r4, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
dup(0xffffffffffffffff)
pipe(0x0)

16:47:08 executing program 2:
quotactl(0x2080000202, &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000200)='/')

16:47:08 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10)
r4 = socket(0x400000000000010, 0x802, 0x0)
write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24)
setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100), 0x2fe)

16:47:08 executing program 1:
socket$inet(0xa, 0x801, 0x84)
connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541e, 0x0)
getpgid(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000140)={0xb, 0x100, 0x0, {0x0, 0x1ff, 0xfffffe01}})
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
write$apparmor_current(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYRES32], 0x1)
write$apparmor_current(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64], 0x3)
creat(&(0x7f00000000c0)='./bus\x00', 0x0)
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8)
sendmmsg(r0, &(0x7f0000006d00), 0xc6, 0x24000000)
listen(r0, 0x8)

16:47:09 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x80)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write$binfmt_misc(r2, &(0x7f0000000900)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC, @ANYRESHEX]], 0xfe9a)
recvmmsg(r1, &(0x7f0000006e00)=[{{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f0000003440)=""/128, 0x80}], 0x1}}], 0x1, 0x0, 0x0)

16:47:09 executing program 0:
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = socket$bt_cmtp(0x1f, 0x3, 0x5)
getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000001280)=0x8, &(0x7f00000012c0)=0x4)
perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0xfffffffffffffffc, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
wait4(0x0, 0x0, 0x80000002, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b04, &(0x7f0000000000)='wlan0\x00')
ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f00000013c0))
r4 = socket$inet6_sctp(0xa, 0x0, 0x84)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000600))
r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000001500)=ANY=[@ANYBLOB="394ec706ac861186716b16c60999e2b9ec97ac5c5bf4816a78e304009887374158334f39e85265d143b3292d1a8bcd74d23854f586d97b3aa87459e8bd8338f7c3638289c4d2a72a897f19e6c7491d61a72ca98c861bc3346031c40004ccf8764d182de27d4e2f2f337949f2300100000025deade175b81edad9591d14d2616c73f98a7e069760e5739211ce2b83ea61c5eef46e6cf2ff50f91a7f2b60781c297b981723978c65281693", @ANYRES32=<r6=>0x0], &(0x7f000095dffc)=0x2)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r6, @in={{0x2, 0x0, @loopback=0xac141400}}}, &(0x7f00000000c0)=0x90)
setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000001240)={0x2, 0x1000c, 0x0, 0x800, r6}, 0x0)
r7 = socket(0x1e, 0x1, 0x0)
recvmsg$kcm(r7, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)}, 0x0)
recvmmsg(r7, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000001340)=[{0x0}], 0x1, &(0x7f0000000000)=""/43, 0x2b}}], 0x1, 0x0, 0x0)
setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0)
utime(0x0, &(0x7f0000000200)={0x9, 0x18})
r8 = getpid()
r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r10 = dup(r9)
ioctl$SNDCTL_DSP_GETTRIGGER(r10, 0x80045010, &(0x7f0000000180))
getpid()
rt_tgsigqueueinfo(0x0, r8, 0x0, 0x0)
ptrace$pokeuser(0x6, r8, 0x388, 0xb8)

16:47:09 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10)
r4 = socket(0x400000000000010, 0x802, 0x0)
write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24)
setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100), 0x2fe)

16:47:09 executing program 2:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x1e00, 0x0, 0x101}})

16:47:10 executing program 1:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="01003dbedf45931d300da6c72dcc48bba2dfe0fdceadc5c2548860eea96588ca4e052a280c0fc4b3ff302b1f49c8b2ee0a57b1b73af9bb0777bcf21184c110532cb0eae7bc3a40eabcb94681ee022ec11cab1f6e96439241d9faea4794df67eb2015cdd923b3cd7436778dff86e596c53611f125a3fd26649127591066152c59f29b26f56a7e60e4adae527e8f31385485c0bd9b46d700d74b38d15811fac38359bc9f5dc3bc3b"], 0x12)
open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
pipe(0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

16:47:10 executing program 4:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x858c73c4dd5c7e4d)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0)
ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140))
clock_adjtime(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340)=""/126, &(0x7f0000000240)=0x7e)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000280)=0x4)
perf_event_open(&(0x7f0000000440)={0x2, 0x245, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffff9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401c0180000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:47:10 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10)
r4 = socket(0x400000000000010, 0x802, 0x0)
write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24)
setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100), 0x2fe)

16:47:10 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x12, 0x1, 0x4, 0x100000001}, 0x3c)
bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={r0, &(0x7f0000000500), 0x0}, 0x20)

[ 1200.277288] kauditd_printk_skb: 312 callbacks suppressed
[ 1200.277305] audit: type=1400 audit(1577724431.095:16425): avc:  denied  { map } for  pid=27161 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1200.510267] audit: type=1400 audit(1577724431.095:16426): avc:  denied  { map } for  pid=27158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1200.745320] audit: type=1400 audit(1577724431.135:16427): avc:  denied  { map } for  pid=27161 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1200.905502] audit: type=1400 audit(1577724431.145:16428): avc:  denied  { map } for  pid=27158 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1201.013060] audit: type=1400 audit(1577724431.155:16429): avc:  denied  { map } for  pid=27169 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:11 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x0, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x77})
ptrace$setopts(0x4206, r4, 0x0, 0x0)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffe9c}, {&(0x7f0000000140)=""/64, 0xfffffffffffffdbe}], 0x3, 0x0, 0x0, 0x0)
tkill(r4, 0x3c)
ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080))
ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000180)={0x505340e3, 0x0, 0x0, 0xffff8001, 0x11, "3b0b3bba022be4e7dcac7ee3cdc584eef4ca9e"})
ptrace$cont(0x9, r4, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
dup(0xffffffffffffffff)
pipe(0x0)

16:47:11 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x12, 0x1, 0x4, 0x100000001}, 0x3c)
bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={r0, &(0x7f0000000500), 0x0}, 0x20)

16:47:11 executing program 0:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b2b, &(0x7f0000000600)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x02\x00\x00\x0f\xdc\x00\x00\x00!\a\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00\a\x00\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\a\x00vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x99\xb9j\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0X\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x990\xcei\xf2\xd1\x04\xde\xaa\xfa\xc0\xe9c\x81\x86\xc3j2m\xf6B\x19=h\x8fe\xc2\x13\x92?||\xbf\x10\x8f$\xdf^\xba\x04^\x13\r}\xd2n?3O\xb5\xa8\xfa\xfe\xe6\x92\xfd\x1c\xbc\x15\x81G\xbeC\xb2\x80\x87\x83\xb6\xf7wz\xcf\xa3c\xac\xe56\x8cg\x15\x9e\x96c')

16:47:11 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0)
r2 = dup3(r0, r1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10)
r4 = socket(0x400000000000010, 0x802, 0x0)
write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24)
setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100), 0x2fe)

16:47:11 executing program 1:
r0 = socket$inet(0xa, 0x801, 0x0)
setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040)="fcb6626f", 0x4)

16:47:12 executing program 4:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x858c73c4dd5c7e4d)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0)
ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140))
clock_adjtime(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340)=""/126, &(0x7f0000000240)=0x7e)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000280)=0x4)
perf_event_open(&(0x7f0000000440)={0x2, 0x245, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffff9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401c0180000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

[ 1201.241095] audit: type=1400 audit(1577724431.155:16430): avc:  denied  { map } for  pid=27169 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1201.426946] audit: type=1400 audit(1577724431.185:16431): avc:  denied  { map } for  pid=27169 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1201.615666] audit: type=1400 audit(1577724431.195:16432): avc:  denied  { map } for  pid=27161 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1201.813284] audit: type=1400 audit(1577724431.205:16433): avc:  denied  { map } for  pid=27169 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:12 executing program 0:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
faccessat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2, 0x0)

16:47:12 executing program 1:
r0 = socket$inet(0xa, 0x801, 0x0)
setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040)="fcb6626f", 0x4)

[ 1201.932614] audit: audit_backlog=65 > audit_backlog_limit=64
16:47:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_dev$admmidi(0x0, 0x100000000, 0x0)
ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000440)={0x0, 0x0})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
splice(0xffffffffffffffff, &(0x7f0000000280), r1, 0x0, 0x1, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfc43)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@loopback, @rand_addr="b3ffadac825170675d5e96e14627ed30", @mcast2, 0x0, 0x9, 0x8e, 0x400, 0x8, 0x100, r2})
write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527)
accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000500))
r3 = socket$inet6(0xa, 0x40000080806, 0x0)
syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00')
setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x7fb, 0x4)
bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c)
syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x3ff, 0x101000)
listen(r3, 0x400000001ffffffd)
r4 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r5 = accept4(r3, 0x0, 0x0, 0x0)
sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0)

16:47:13 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x12, 0x1, 0x4, 0x100000001}, 0x3c)
bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={r0, &(0x7f0000000500), 0x0}, 0x20)

16:47:13 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x0, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x77})
ptrace$setopts(0x4206, r4, 0x0, 0x0)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffe9c}, {&(0x7f0000000140)=""/64, 0xfffffffffffffdbe}], 0x3, 0x0, 0x0, 0x0)
tkill(r4, 0x3c)
ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080))
ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000180)={0x505340e3, 0x0, 0x0, 0xffff8001, 0x11, "3b0b3bba022be4e7dcac7ee3cdc584eef4ca9e"})
ptrace$cont(0x9, r4, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
dup(0xffffffffffffffff)
pipe(0x0)

16:47:13 executing program 0:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
faccessat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2, 0x0)

16:47:13 executing program 1:
r0 = socket$inet(0xa, 0x801, 0x0)
setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040)="fcb6626f", 0x4)

16:47:13 executing program 4:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x858c73c4dd5c7e4d)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0)
ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140))
clock_adjtime(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340)=""/126, &(0x7f0000000240)=0x7e)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000280)=0x4)
perf_event_open(&(0x7f0000000440)={0x2, 0x245, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffff9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401c0180000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:47:14 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0)
setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000140)="54458949c3d9043efba07caf7974c3eaa3c02ea3bfebf3d40ad0eb4a14f13e47572f4c177ef01c65306e63ad8c5ba5863446d43d145d2568de95e37221473566d71a87b544c7dfcb808e44146796bcde0d558240a174d982345e0e59724543cffe5dc5d47f505890ae6c0b0fcf9a5f88150d5190be2ddc15dc5f9ff3dcba4e21fba3b9ddcfad50a18f90e945d282df14a31f9b42030234f8b4c6a00a78809f98998ac592e4e7d747e73c59549b61dbdf35c0962f97ec3db73626e6af8b", 0xbd)
getpid()
r1 = getpgid(0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1500}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000200)={<r2=>0xffffffffffffffff})
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8,\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0)
ftruncate(0xffffffffffffffff, 0x200004)
clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

16:47:14 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x12, 0x1, 0x4, 0x100000001}, 0x3c)
bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={r0, &(0x7f0000000500), 0x0}, 0x20)

16:47:14 executing program 5:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup3(r0, r1, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x0, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r4 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x77})
ptrace$setopts(0x4206, r4, 0x0, 0x0)
process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffe9c}, {&(0x7f0000000140)=""/64, 0xfffffffffffffdbe}], 0x3, 0x0, 0x0, 0x0)
tkill(r4, 0x3c)
ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080))
ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000180)={0x505340e3, 0x0, 0x0, 0xffff8001, 0x11, "3b0b3bba022be4e7dcac7ee3cdc584eef4ca9e"})
ptrace$cont(0x9, r4, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3)
dup(0xffffffffffffffff)
pipe(0x0)

16:47:14 executing program 1:
r0 = socket$inet(0xa, 0x801, 0x0)
setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040)="fcb6626f", 0x4)

16:47:15 executing program 0:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
faccessat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2, 0x0)

16:47:15 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240))
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf)

16:47:15 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r0, 0x80)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r2 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000007fffffff000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1000000000000256)

16:47:15 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDGETKEYCODE(r0, 0x560e, &(0x7f0000000240))

16:47:15 executing program 4:
socket$inet6_tcp(0xa, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x858c73c4dd5c7e4d)
ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0)
ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140))
clock_adjtime(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340)=""/126, &(0x7f0000000240)=0x7e)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000280)=0x4)
perf_event_open(&(0x7f0000000440)={0x2, 0x245, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffff9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001000000010000000040000000401c0180000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0)

16:47:15 executing program 3:
timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000001c0))
timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=<r0=>0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

16:47:16 executing program 0:
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
faccessat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x2, 0x0)

[ 1205.311912] kauditd_printk_skb: 182 callbacks suppressed
[ 1205.311930] audit: type=1400 audit(1577724436.125:16596): avc:  denied  { map } for  pid=27246 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1205.477601] audit: type=1400 audit(1577724436.175:16597): avc:  denied  { map } for  pid=27245 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1205.691765] audit: type=1400 audit(1577724436.205:16598): avc:  denied  { map } for  pid=27245 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:16 executing program 2:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

[ 1205.877358] audit: type=1400 audit(1577724436.215:16599): avc:  denied  { map } for  pid=27246 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:16 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r0, 0x80)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r2 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000007fffffff000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1000000000000256)

16:47:16 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c)
r4 = dup2(r3, r3)
mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r4, 0x0)
setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c)
r5 = dup2(r2, r2)
mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r5, 0x0)

[ 1206.014627] audit: type=1400 audit(1577724436.215:16600): avc:  denied  { map } for  pid=27246 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1206.169271] audit: type=1400 audit(1577724436.215:16601): avc:  denied  { map } for  pid=27246 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1206.364070] audit: type=1400 audit(1577724436.255:16602): avc:  denied  { map } for  pid=27245 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:17 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

[ 1206.530807] audit: type=1400 audit(1577724436.275:16603): avc:  denied  { map } for  pid=27245 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:17 executing program 3:
timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000001c0))
timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=<r0=>0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

[ 1206.724906] audit: type=1400 audit(1577724436.295:16604): avc:  denied  { map } for  pid=27246 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1206.845321] protocol 88fb is buggy, dev hsr_slave_0
[ 1206.845326] protocol 88fb is buggy, dev hsr_slave_0
[ 1206.845384] protocol 88fb is buggy, dev hsr_slave_1
[ 1206.850426] protocol 88fb is buggy, dev hsr_slave_1
[ 1206.885321] audit: type=1400 audit(1577724436.335:16605): avc:  denied  { map } for  pid=27245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1206.925296] protocol 88fb is buggy, dev hsr_slave_0
[ 1206.930455] protocol 88fb is buggy, dev hsr_slave_1
16:47:17 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x1)
fcntl$setstatus(r1, 0x4, 0x102800)
write(r1, &(0x7f0000000000)="d5", 0xfffffedf)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x15)
dup3(r1, r0, 0x0)

16:47:17 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r0, 0x80)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r2 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000007fffffff000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1000000000000256)

16:47:18 executing program 4:
timer_create(0xffbffffffffffff0, &(0x7f0000000140)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040))
timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)

16:47:18 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07", 0x8}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:47:18 executing program 2:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:19 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r0, 0x80)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r2 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000007fffffff000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000400400000", 0x58}], 0x1000000000000256)

16:47:19 executing program 4:
timer_create(0xffbffffffffffff0, &(0x7f0000000140)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040))
timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)

16:47:19 executing program 3:
timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000001c0))
timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=<r0=>0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

16:47:19 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

16:47:20 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

16:47:20 executing program 4:
timer_create(0xffbffffffffffff0, &(0x7f0000000140)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040))
timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)

16:47:20 executing program 2:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:20 executing program 4:
timer_create(0xffbffffffffffff0, &(0x7f0000000140)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040))
timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)

16:47:21 executing program 3:
timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000001c0))
timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=<r0=>0x0)
timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)
clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)

[ 1210.324276] kauditd_printk_skb: 158 callbacks suppressed
[ 1210.324293] audit: type=1400 audit(1577724441.135:16764): avc:  denied  { map } for  pid=27338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1210.434314] audit: type=1400 audit(1577724441.145:16765): avc:  denied  { map } for  pid=27335 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1210.611206] audit: type=1400 audit(1577724441.145:16766): avc:  denied  { map } for  pid=27335 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1210.803041] audit: type=1400 audit(1577724441.185:16767): avc:  denied  { map } for  pid=27338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1210.942373] audit: type=1400 audit(1577724441.185:16768): avc:  denied  { map } for  pid=27338 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:21 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

[ 1211.091688] audit: type=1400 audit(1577724441.185:16769): avc:  denied  { map } for  pid=27338 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1211.192398] audit: type=1400 audit(1577724441.265:16770): avc:  denied  { map } for  pid=27338 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07", 0x8}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:47:22 executing program 4:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

[ 1211.348835] audit: type=1400 audit(1577724441.315:16771): avc:  denied  { map } for  pid=27338 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:22 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

[ 1211.433711] audit: type=1400 audit(1577724441.315:16772): avc:  denied  { map } for  pid=27338 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1211.575452] audit: type=1400 audit(1577724441.355:16773): avc:  denied  { map } for  pid=27338 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:22 executing program 2:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:22 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd3\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"v\x19n{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r1, 0x20400000, 0x0)
writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)

16:47:23 executing program 4:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:24 executing program 3:
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
ftruncate(r1, 0x8200)
r2 = open(&(0x7f0000000340)='./file0\x00', 0x208400, 0x141)
setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000380), 0x6)
openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
getpid()
syz_open_dev$amidi(0x0, 0x3769, 0x468800)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00'}, 0x30)
recvmmsg(r2, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x3db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4000000000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:24 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

16:47:24 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0)
io_setup(0x7ff, &(0x7f00000000c0)=<r1=>0x0)
io_submit(r1, 0x0, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}])
r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x2)
r3 = inotify_init()
ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0x2, 0x8, 0x8000})
epoll_create1(0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(0x0, &(0x7f0000000080)='./file0\x00')
getdents64(r4, 0x0, 0x0)
r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'myz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$unlink(0x9, r5, 0xfffffffffffffffd)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r7 = socket(0x2, 0x1, 0x0)
listen(r7, 0x0)
syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00')
r8 = socket(0x10, 0x3, 0x0)
sendfile(r8, 0xffffffffffffffff, &(0x7f0000000000), 0xddf5)
add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe)
ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}})

16:47:25 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001)

16:47:25 executing program 3:
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
ftruncate(r1, 0x8200)
r2 = open(&(0x7f0000000340)='./file0\x00', 0x208400, 0x141)
setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000380), 0x6)
openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
getpid()
syz_open_dev$amidi(0x0, 0x3769, 0x468800)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00'}, 0x30)
recvmmsg(r2, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x3db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4000000000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:25 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07", 0x8}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

16:47:26 executing program 0:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:26 executing program 4:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x6100)
ftruncate(r2, 0x8200)
recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = syz_open_procfs(0x0, 0x0)
preadv(r4, 0x0, 0x0, 0x0)
syz_open_dev$ptys(0xc, 0x3, 0x1)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
getuid()
lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380))
getuid()
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c8575f8f685f9196a27c726606", @ANYRESOCT, @ANYRESDEC])
getgroups(0x0, 0x0)
write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

[ 1215.357915] kauditd_printk_skb: 131 callbacks suppressed
[ 1215.357935] audit: type=1400 audit(1577724446.175:16905): avc:  denied  { map } for  pid=27399 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=112444 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1
[ 1215.625186] audit: type=1400 audit(1577724446.435:16906): avc:  denied  { map } for  pid=27404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:26 executing program 2:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1215.765501] audit: type=1400 audit(1577724446.495:16907): avc:  denied  { map } for  pid=27404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1215.913442] audit: type=1400 audit(1577724446.495:16908): avc:  denied  { map } for  pid=27404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:26 executing program 3:
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
ftruncate(r1, 0x8200)
r2 = open(&(0x7f0000000340)='./file0\x00', 0x208400, 0x141)
setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000380), 0x6)
openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
getpid()
syz_open_dev$amidi(0x0, 0x3769, 0x468800)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00'}, 0x30)
recvmmsg(r2, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x3db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4000000000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

16:47:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f", 0x9f}], 0x4, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[ 1216.143878] audit: type=1400 audit(1577724446.535:16909): avc:  denied  { map } for  pid=27404 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:27 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07", 0x8}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x20, r0, 0x0, 0x0)

[ 1216.415385] audit: type=1400 audit(1577724446.615:16910): avc:  denied  { map } for  pid=27404 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1216.543416] FAT-fs (loop0): bogus number of reserved sectors
[ 1216.585312] audit: type=1400 audit(1577724446.665:16911): avc:  denied  { map } for  pid=27404 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1216.685503] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 1216.792028] audit: type=1400 audit(1577724446.665:16912): avc:  denied  { map } for  pid=27406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1216.970083] audit: type=1400 audit(1577724446.665:16913): avc:  denied  { map } for  pid=27404 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1217.083791] FAT-fs (loop0): bogus number of reserved sectors
[ 1217.156646] audit: type=1400 audit(1577724446.675:16914): avc:  denied  { map } for  pid=27406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1217.167208] FAT-fs (loop0): Can't find a valid FAT filesystem
16:47:28 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1})
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)

16:47:28 executing program 0:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:28 executing program 2:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:29 executing program 4:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:29 executing program 3:
r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
fcntl$setstatus(r1, 0x4, 0x6100)
ftruncate(r1, 0x8200)
r2 = open(&(0x7f0000000340)='./file0\x00', 0x208400, 0x141)
setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000380), 0x6)
openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
gettid()
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
getpid()
syz_open_dev$amidi(0x0, 0x3769, 0x468800)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00'}, 0x30)
recvmmsg(r2, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7})
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x1, 0x3db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4000000000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f)
getresuid(&(0x7f0000004180), 0x0, 0x0)

[ 1218.742262] FAT-fs (loop0): bogus number of reserved sectors
[ 1218.808243] FAT-fs (loop0): Can't find a valid FAT filesystem
16:47:29 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1})
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)

16:47:29 executing program 2:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:30 executing program 4:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:30 executing program 0:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:30 executing program 5:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:30 executing program 3:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:31 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1})
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)

[ 1220.422576] kauditd_printk_skb: 163 callbacks suppressed
[ 1220.422594] audit: type=1400 audit(1577724451.235:17078): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1220.546407] audit: type=1400 audit(1577724451.245:17079): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:31 executing program 2:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1220.847715] audit: type=1400 audit(1577724451.285:17080): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1220.984392] audit: type=1400 audit(1577724451.295:17081): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1221.084284] FAT-fs (loop0): bogus number of reserved sectors
[ 1221.124297] audit: type=1400 audit(1577724451.395:17082): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:32 executing program 3:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1221.272303] FAT-fs (loop0): Can't find a valid FAT filesystem
16:47:32 executing program 4:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1221.330208] audit: type=1400 audit(1577724451.405:17083): avc:  denied  { map } for  pid=27478 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:32 executing program 5:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1221.501280] audit: type=1400 audit(1577724451.405:17084): avc:  denied  { map } for  pid=27484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:32 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1})
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)

[ 1221.654337] audit: type=1400 audit(1577724451.425:17085): avc:  denied  { map } for  pid=27484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1221.934787] audit: type=1400 audit(1577724451.465:17086): avc:  denied  { map } for  pid=27484 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:33 executing program 0:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

[ 1222.191955] audit: type=1400 audit(1577724451.495:17087): avc:  denied  { map } for  pid=27484 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:33 executing program 2:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:33 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0)

16:47:33 executing program 3:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

16:47:33 executing program 4:
perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f0000000140)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0)
pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000200)="47a03bc40db7e5b02ddf3196db1f98a4716b48b9145233977db427975e54a9afc4bfcfaedfda18a9ac45c1d06cac6e48e244cc1eddc2f3539eb66121d188c4ac4d26170968e2d27b8d83", 0x1}], 0x1cf, 0x0)

16:47:34 executing program 5:
accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x0)
prlimit64(0x0, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setpipe(r1, 0x407, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[ 1223.296965] FAT-fs (loop0): bogus number of reserved sectors
[ 1223.488358] netlink: 'syz-executor.1': attribute type 24 has an invalid length.
[ 1223.519699] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 1223.599933] netlink: 'syz-executor.1': attribute type 1 has an invalid length.
[ 1223.616656] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: invalid value (0)
[ 1223.671174] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: allowed values 1 - 65535
16:47:34 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0)

16:47:35 executing program 4:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000b94000)=""/246)
close(r0)

16:47:35 executing program 3:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:35 executing program 0:
socket(0xa, 0x2, 0x0)
socket(0x0, 0x0, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0)
ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x1, 0x0, 0x0})

[ 1224.818535] netlink: 'syz-executor.1': attribute type 24 has an invalid length.
[ 1224.865324] netlink: 'syz-executor.1': attribute type 1 has an invalid length.
[ 1224.942496] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: invalid value (0)
16:47:35 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000180)={[{0x0, 0xfffd, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x7e}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]})
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$int_in(r3, 0x0, 0x0)
clock_getres(0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x100})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[ 1225.015859] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: allowed values 1 - 65535
[ 1225.164989] FAT-fs (loop2): bogus number of reserved sectors
16:47:36 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0)

[ 1225.229277] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1225.454307] kauditd_printk_skb: 184 callbacks suppressed
[ 1225.454322] audit: type=1400 audit(1577724456.265:17272): avc:  denied  { map } for  pid=27568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:36 executing program 4:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_KICK(r0, 0x80083313, 0x0)

[ 1225.625433] audit: type=1400 audit(1577724456.275:17273): avc:  denied  { map } for  pid=27568 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1225.758568] audit: type=1400 audit(1577724456.295:17274): avc:  denied  { map } for  pid=27568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1225.932540] audit: type=1400 audit(1577724456.315:17275): avc:  denied  { map } for  pid=27568 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1226.122854] audit: type=1400 audit(1577724456.355:17276): avc:  denied  { map } for  pid=27568 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:37 executing program 2:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:37 executing program 3:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:37 executing program 0:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:37 executing program 5:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10)
close(r0)

[ 1226.343121] netlink: 'syz-executor.1': attribute type 24 has an invalid length.
[ 1226.357867] audit: type=1400 audit(1577724456.395:17277): avc:  denied  { map } for  pid=27568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1226.406739] netlink: 'syz-executor.1': attribute type 1 has an invalid length.
[ 1226.472949] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: invalid value (0)
[ 1226.534342] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: allowed values 1 - 65535
[ 1226.566695] audit: type=1400 audit(1577724456.395:17278): avc:  denied  { map } for  pid=27568 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:37 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={<r0=>0xffffffffffffffff})
recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/187, 0xbb}}], 0x1, 0x0, 0x0)
sendmmsg(r0, &(0x7f0000003040), 0x3fffffffffffff1, 0x0)

[ 1226.748645] audit: audit_backlog=65 > audit_backlog_limit=64
[ 1226.802658] audit: audit_lost=116 audit_rate_limit=0 audit_backlog_limit=64
16:47:37 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0)

[ 1226.842958] audit: type=1400 audit(1577724456.475:17279): avc:  denied  { map } for  pid=27568 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:38 executing program 5:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10)
close(r0)

[ 1227.642661] FAT-fs (loop2): bogus number of reserved sectors
16:47:38 executing program 3:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

[ 1227.877901] netlink: 'syz-executor.1': attribute type 24 has an invalid length.
[ 1227.895283] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1227.955318] netlink: 'syz-executor.1': attribute type 1 has an invalid length.
[ 1228.009699] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: invalid value (0)
16:47:38 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

[ 1228.135430] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: allowed values 1 - 65535
16:47:39 executing program 0:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="38aa791afcc6982a123813d249a1fb4650652a437234043008e9d85b0f7e6c2885e67800101000800000004bb9d64f00a8d0578ad80d633c51e86de2e6c1bc534bf9e5a08dc1fbf083eb54534f7a22a61faf3f17ad41d5994e630198d5e33e485119d0859c4a642bc55936a24beec0b77ff9df88d71a0220341ea32af193c9fa6511756f0a56cf70ef9158dcc809125b2e55b38415828bd295be8641eb3b996883594eccd2f771", 0xa7}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

16:47:39 executing program 2:
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40, 0x0)
ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000240))
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x6]})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6ba7a95048317940}, 0xc, 0x0}, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00')
ioctl$PPPIOCSDEBUG(r1, 0x40047440, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
umount2(&(0x7f0000000540)='./file0\x00', 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20)
syz_genetlink_get_family_id$tipc(0x0)

16:47:39 executing program 5:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10)
close(r0)

16:47:40 executing program 3:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:40 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90407486516080003000a00000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

[ 1230.466505] kauditd_printk_skb: 217 callbacks suppressed
[ 1230.466522] audit: type=1400 audit(1577724461.195:17483): avc:  denied  { map } for  pid=27651 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:41 executing program 0:
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x5ea45bbde364b00b})
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x4004, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x1, 0x0)
io_setup(0x14ec, &(0x7f0000000180))
r0 = socket$kcm(0x2b, 0x1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3<R\xe1\xe3\x86\x92\x8bc\xeda\x0f7\xf4v\xeaUu\xf0\x8d\xe3\xd5\xbc|\xd9\xf1\x8f)\xb5\xc8\xb9\xe5M\xfdd\xca\x92=\xde\xa3\x06\x903\xf0+\xa7Ge\xc5\x8b\xa6#\x8e\x1f\x847sSR\x00\x00\x00', 0x26e1, 0x0)
setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0x4)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000)

16:47:41 executing program 5:
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071")
bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10)
close(r0)

16:47:41 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

[ 1230.734550] audit: type=1400 audit(1577724461.315:17488): avc:  denied  { map } for  pid=27651 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:41 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90407486516080003000a00000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

[ 1231.024825] audit: type=1400 audit(1577724461.375:17489): avc:  denied  { map } for  pid=27651 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1231.054741] FAT-fs (loop2): bogus number of reserved sectors
[ 1231.088672] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 1231.140892] audit: type=1400 audit(1577724461.395:17490): avc:  denied  { create } for  pid=27655 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 1231.450118] audit: type=1400 audit(1577724461.395:17491): avc:  denied  { map } for  pid=27650 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
16:47:42 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

[ 1231.709170] audit: type=1400 audit(1577724461.395:17492): avc:  denied  { map } for  pid=27650 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1231.884092] audit: type=1400 audit(1577724461.415:17493): avc:  denied  { map } for  pid=27651 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1231.910705] audit: type=1400 audit(1577724461.415:17494): avc:  denied  { map } for  pid=27651 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[ 1231.967744] audit: type=1400 audit(1577724461.445:17495): avc:  denied  { write } for  pid=27655 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
16:47:42 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

16:47:42 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

[ 1232.138610] audit: type=1400 audit(1577724461.465:17496): avc:  denied  { create } for  pid=27655 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
16:47:43 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90407486516080003000a00000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

16:47:43 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x8000, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r2, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}, 0x1, 0x4c00}, 0x0)
sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58)
r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080), 0x0)
unshare(0x40000000)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0)
r4 = dup(0xffffffffffffffff)
sendmsg$DEVLINK_CMD_GET(r4, 0x0, 0x40000)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r5, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
r6 = accept4(r5, 0x0, 0x0, 0x0)
sendmmsg$alg(r6, &(0x7f0000002700)=[{0x0, 0x0, 0x0}], 0x1, 0x0)
sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100))
ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200))

16:47:44 executing program 0:
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self//exe\x00', 0x3, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87<B%\xd1g\xd6\xe3\xca8\x9aT\x0e\xf5iA\x05\x13\x02\x14\to\xca\xf7\x04\x15U2\xaef\x1d\xb6\x9f')
fcntl$setstatus(r0, 0x4, 0x64600)
ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000c80))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x5}, 0x4)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00')
r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='\xff\x01\x00\x00\x00\x00\b\x00', 0x80, 0x0)
preadv(r4, &(0x7f0000000a80)=[{&(0x7f0000000740)=""/226, 0xe2}, {&(0x7f0000000840)=""/106, 0x6a}, {&(0x7f00000008c0)=""/188, 0xbc}, {&(0x7f0000000980)=""/5, 0x5}, {&(0x7f00000009c0)=""/5, 0x5}], 0x5, 0x3)
sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000680)={0x14, r3, 0x1, 0x0, 0x0, {0xd}}, 0x14}}, 0x0)
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00')
sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000640)={&(0x7f0000000240), 0xc, &(0x7f0000000600)={&(0x7f0000000480)={0x16c, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x41}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x58b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf5da}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4005010)
ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/89)
r6 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r6, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58)
pipe(&(0x7f0000000140)={<r7=>0xffffffffffffffff})
vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0)
setsockopt$RXRPC_SECURITY_KEY(r7, 0x110, 0x1, &(0x7f0000000180)='\x00', 0x1)
r8 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
pwritev(r8, &(0x7f0000000a00)=[{&(0x7f0000000b00)="4dc7d80b331521731d7926cafdcc046ddf58e9a28420ce2730413b82f155991bedebd8ebef0b874cbb1a82cf46b830530c6b18adc0b8c1c6dd9e538a21b80bf99d7bed52c97333a360af54ea215b2d4f67b6a1659f213b036e24c952fabc69d3ef3ade18a294662f0a3ffcfea3b276a322777d793bd5d415f145c260ae810e", 0x7f}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000000b80)="a4cad46ed5613443b8bd50c58d5562c7237b2050bde4bf836f228c2f4aadac68ca02cb724da23b2981561cc1498262936b1b4ecbe5b8b26989b5c640be86bac0b66df6532b5fd2e55b243bc92a3d6838173ee9863ad1035944d7741e54c016200089717f6c735d6d4d4b4ce8c5b9c5d286789704554f72194326f6c535469247cb3893aac60667c247c3006a08b052bc5c7ab22d69ad3f23ab0c3cdcfa8b33ffc1cea2c2aef6b3a3bc04ca9a87b21a33c6b26f0d193396d5cffd6805d14e272f177088d6582305ff8b447d77ebc67a2d45924904fe84d035cec830accfb78665", 0xe0}], 0x3, 0x101)
setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0)
ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000200))
write$P9_RSYMLINK(r0, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x0, 0x4, 0x6}}, 0x14)
r9 = accept$alg(r6, 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000000)={0x0, @reserved})
sendfile(r9, r0, 0x0, 0x80000000)

16:47:44 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90407486516080003000a00000012000014c2ed3c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0)

[ 1233.588183] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000)
16:47:44 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

16:47:44 executing program 2:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x8, 0x4)

[ 1234.020849] IPVS: ftp: loaded support on port[0] = 21
16:47:44 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mprotect(&(0x7f0000028000/0x2000)=nil, 0x2000, 0x0)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002)

16:47:45 executing program 1:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
write$binfmt_elf64(r0, &(0x7f0000000800)={{0x1b, 0x5d, 0x50, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78)

[ 1234.645594] IPVS: Error connecting to the multicast addr
[ 1234.853544] IPVS: ftp: loaded support on port[0] = 21
16:47:45 executing program 2:
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000380))
r1 = getpid()
r2 = getpgid(0x0)
ioprio_get$pid(0x2, r2)
ioprio_get$pid(0x2, 0x0)
rt_tgsigqueueinfo(r1, 0x0, 0x0, 0x0)
capget(&(0x7f0000000080)={0x20080522}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open(0x0, 0x0, 0x0)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r5 = socket$inet6(0xa, 0x803, 0x3)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'})
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000100), 0x8)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0)
r7 = dup3(r3, r4, 0x0)
dup2(r7, r6)

[ 1235.220814] BUG: unable to handle kernel paging request at 000000010000000e
[ 1235.220824] PGD 938c3067 P4D 938c3067 PUD 0 
[ 1235.220845] Oops: 0002 [#1] PREEMPT SMP KASAN
[ 1235.220860] CPU: 0 PID: 27731 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0
[ 1235.220870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1235.220958] RIP: 0010:insert_char+0x23d/0x450
[ 1235.220974] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 01 0f 8e 32 01 00 00 d1 eb 41 0f b7 85 c8 03 00 00 4c 89 ff 89 d9 <f3> 66 ab 49 8d bd 78 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89
[ 1235.220982] RSP: 0018:ffff888057827728 EFLAGS: 00010202
[ 1235.220994] RAX: 0000000000000720 RBX: 0000000000000001 RCX: 0000000000000001
[ 1235.221003] RDX: 1ffff1100b825881 RSI: 000000010000000e RDI: 000000010000000e
[ 1235.221012] RBP: ffff888057827770 R08: ffff88805ef1e300 R09: 0000000000000005
[ 1235.221021] R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000
[ 1235.221031] R13: ffff88805c12c040 R14: ffff88805c12c374 R15: 000000010000000e
[ 1235.221044] FS:  00007f2bd6252700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
[ 1235.221052] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1235.221061] CR2: 000000010000000e CR3: 0000000060d95000 CR4: 00000000001406f0
[ 1235.221072] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1235.221080] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 1235.221084] Call Trace:
[ 1235.221104]  do_con_trol+0x3ca8/0x6070
[ 1235.221122]  ? reset_palette+0x190/0x190
[ 1235.221138]  ? kasan_check_read+0x11/0x20
[ 1235.221159]  ? __atomic_notifier_call_chain+0xfd/0x1a0
[ 1235.221183]  do_con_write.part.0+0xfd5/0x1eb0
[ 1235.221207]  ? do_con_trol+0x6070/0x6070
[ 1235.221221]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[ 1235.221236]  ? add_wait_queue+0x112/0x170
[ 1235.221250]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[ 1235.221268]  ? trace_hardirqs_on+0x67/0x220
[ 1235.221286]  con_write+0x46/0xd0
[ 1235.221332]  n_tty_write+0x3f9/0x1140
[ 1235.221354]  ? process_echoes+0x170/0x170
[ 1235.221372]  ? do_wait_intr_irq+0x2b0/0x2b0
[ 1235.221391]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 1235.221444]  ? _copy_from_user+0xdd/0x150
[ 1235.221459]  tty_write+0x458/0x7a0
[ 1235.221476]  ? process_echoes+0x170/0x170
[ 1235.221493]  __vfs_write+0x114/0x810
[ 1235.221503]  ? tty_read+0x2a0/0x2a0
[ 1235.221519]  ? kernel_read+0x120/0x120
[ 1235.221534]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[ 1235.221549]  ? __inode_security_revalidate+0xda/0x120
[ 1235.221566]  ? avc_policy_seqno+0xd/0x70
[ 1235.221579]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 1235.221594]  ? selinux_file_permission+0x92/0x550
[ 1235.221611]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 1235.221625]  ? security_file_permission+0x89/0x230
[ 1235.221641]  ? rw_verify_area+0x118/0x360
[ 1235.221657]  vfs_write+0x20c/0x560
[ 1235.221674]  ksys_write+0x14f/0x2d0
[ 1235.221691]  ? __ia32_sys_read+0xb0/0xb0
[ 1235.221707]  ? do_syscall_64+0x26/0x620
[ 1235.221722]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1235.221737]  ? do_syscall_64+0x26/0x620
[ 1235.221754]  __x64_sys_write+0x73/0xb0
[ 1235.221771]  do_syscall_64+0xfd/0x620
[ 1235.221787]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1235.221798] RIP: 0033:0x45a919
[ 1235.221812] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1235.221820] RSP: 002b:00007f2bd6251c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 1235.221833] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919
[ 1235.221840] RDX: 0000000000000078 RSI: 0000000020000800 RDI: 0000000000000003
[ 1235.221849] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000
[ 1235.221858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd62526d4
[ 1235.221867] R13: 00000000004cbdef R14: 00000000004e5c18 R15: 00000000ffffffff
[ 1235.221880] Modules linked in:
[ 1235.221892] CR2: 000000010000000e
[ 1235.244663] ---[ end trace c1c69feb3098124a ]---
[ 1235.244689] RIP: 0010:insert_char+0x23d/0x450
[ 1235.244706] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 01 0f 8e 32 01 00 00 d1 eb 41 0f b7 85 c8 03 00 00 4c 89 ff 89 d9 <f3> 66 ab 49 8d bd 78 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89
[ 1235.244715] RSP: 0018:ffff888057827728 EFLAGS: 00010202
[ 1235.244727] RAX: 0000000000000720 RBX: 0000000000000001 RCX: 0000000000000001
[ 1235.244736] RDX: 1ffff1100b825881 RSI: 000000010000000e RDI: 000000010000000e
[ 1235.244745] RBP: ffff888057827770 R08: ffff88805ef1e300 R09: 0000000000000005
[ 1235.244753] R10: ffffed1015d04732 R11: ffff8880ae823993 R12: 0000000000000000
[ 1235.244763] R13: ffff88805c12c040 R14: ffff88805c12c374 R15: 000000010000000e
[ 1235.244775] FS:  00007f2bd6252700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
[ 1235.244783] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1235.244791] CR2: 0000000001908008 CR3: 0000000060d95000 CR4: 00000000001406f0
[ 1235.244802] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1235.244809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 1235.244817] Kernel panic - not syncing: Fatal exception
[ 1235.246168] Kernel Offset: disabled
[ 1235.734832] Rebooting in 86400 seconds..