/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') sendfile(r0, r3, 0x0, 0x1) mremap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f00006d6000/0x3000)=nil) 13:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 448.628636] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 448.717268] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:04 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0xa, 0xfc, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0, &(0x7f0000000400)=""/21, 0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)) gettid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7, 0x2, &(0x7f0000000140)={0x77359400}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x280401, 0x0) getcwd(&(0x7f0000000180)=""/79, 0x4f) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x1, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x9, 0x4, 0x0, "d2dd5420"}, 0x401, 0x2, @offset=0x57e, 0x4}) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{}, "f7443d9598ba300f", "a9bd3433bb8f330760a4c20b8a6dff2a", "8ec4d6d4", "c5887be9de8f410c"}, 0x28) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'\x00', r4}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:51:04 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffffffffff74) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1acdf4adc16f6945, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x5, 0xa5d}) r2 = geteuid() r3 = getegid() write$FUSE_ENTRY(r1, &(0x7f00000000c0)={0x90, 0xffffffffffffffb4, 0x3, {0x3, 0x1, 0x3f, 0x800, 0xfff, 0x2, {0x5, 0x401, 0xf96, 0x1, 0x6, 0x4, 0x7fffffff, 0x3, 0xc84, 0x1ff, 0xfff, r2, r3, 0xffffffff, 0x6}}}, 0x90) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 13:51:04 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0, 0x0, 0x0, 0xfffffdb6}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 13:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 449.394450] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 449.469184] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 449.485304] kauditd_printk_skb: 295 callbacks suppressed [ 449.485313] audit: type=1400 audit(1576158665.524:11461): avc: denied { map } for pid=16348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 449.714266] audit: type=1400 audit(1576158665.554:11462): avc: denied { map } for pid=16354 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 449.867881] audit: type=1400 audit(1576158665.574:11463): avc: denied { map } for pid=16348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 450.024623] audit: type=1400 audit(1576158665.574:11464): avc: denied { map } for pid=16352 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 450.190189] audit: type=1400 audit(1576158665.584:11465): avc: denied { map } for pid=16352 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 450.286537] audit: type=1400 audit(1576158665.584:11466): avc: denied { map } for pid=16354 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 450.351622] audit: audit_backlog=65 > audit_backlog_limit=64 [ 450.357474] audit: audit_lost=197 audit_rate_limit=0 audit_backlog_limit=64 [ 450.360083] audit: type=1400 audit(1576158665.604:11467): avc: denied { map } for pid=16354 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 450.390249] audit: backlog limit exceeded 13:51:06 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0xa, 0xfc, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0, &(0x7f0000000400)=""/21, 0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)) gettid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7, 0x2, &(0x7f0000000140)={0x77359400}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x280401, 0x0) getcwd(&(0x7f0000000180)=""/79, 0x4f) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x1, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x9, 0x4, 0x0, "d2dd5420"}, 0x401, 0x2, @offset=0x57e, 0x4}) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{}, "f7443d9598ba300f", "a9bd3433bb8f330760a4c20b8a6dff2a", "8ec4d6d4", "c5887be9de8f410c"}, 0x28) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'\x00', r4}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:51:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='vxcan1\x00') 13:51:06 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0xa, 0xfc, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0, &(0x7f0000000400)=""/21, 0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)) gettid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7, 0x2, &(0x7f0000000140)={0x77359400}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x280401, 0x0) getcwd(&(0x7f0000000180)=""/79, 0x4f) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x1, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x9, 0x4, 0x0, "d2dd5420"}, 0x401, 0x2, @offset=0x57e, 0x4}) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{}, "f7443d9598ba300f", "a9bd3433bb8f330760a4c20b8a6dff2a", "8ec4d6d4", "c5887be9de8f410c"}, 0x28) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'\x00', r4}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:51:06 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x20, 0x4, 0x4}}, 0x14) 13:51:06 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0xa, 0xfc, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0, &(0x7f0000000400)=""/21, 0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)) gettid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7, 0x2, &(0x7f0000000140)={0x77359400}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x280401, 0x0) getcwd(&(0x7f0000000180)=""/79, 0x4f) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x1, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x9, 0x4, 0x0, "d2dd5420"}, 0x401, 0x2, @offset=0x57e, 0x4}) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{}, "f7443d9598ba300f", "a9bd3433bb8f330760a4c20b8a6dff2a", "8ec4d6d4", "c5887be9de8f410c"}, 0x28) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'\x00', r4}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:51:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 450.847183] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$inet(r1, &(0x7f00000008c0)={&(0x7f0000000300)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000340)="6426206f1460c292da9bd25c96b2d651d0150c5bb2ffa266a2e1c6a3ed7e8d230261b00ff6b64806f9de4b78eadbea22c1d1c9be6729d03de7ceff24f504fab07763394076abb2bffc36ab5447bf839403e101dc2cf66e3d7a463870", 0x5c}, {&(0x7f00000003c0)="791e4630afcb4422856004adb21ba6c57b2f4bf44638162e6f79115e229da50063b2f9b4efb006934dd72f0f8327896840976e3196bb296c9b6e6debec615c68688e31299135cb07d1487b35bb47e65dca977e91fe247f42316bea9a9b77d7ed3a06c2b484fb26a2ce74877f2f9397913e546cd00031d85a9ccfa709db63e77eae0a2b7df74c6ffc2c96ce0dd6d00649956cc0e3a8badd7a70f7378bc8e9", 0x9e}, {&(0x7f0000000480)="4a24bb3b6adc0b552bc012c6789ce1f95049af9a9ad541790e", 0x19}, {&(0x7f00000004c0)="b55dd7f49bea1858f4cca4941bbe1a3a43fbbb9f6f0365110159c20caf14ea823d6e6dba66a2421f225ef623eb34a7d26edefe5c23c7e9b5b191ab151aa467604d89fcbf694c4406cf7e61d8770ead8cd9e9ff492fb8d82178b5aed2ae893c51d864df43b72109d83611967dcd3eef8cf11296a4c37f9945a01e9d88e8cad541da36f6f860066ef8032648f1741b4809b4e3d6e46dcf2cbb217a9904c207ff4557ec1f64772aa88ae82fbb752cf77d1a1fb9072224e4e2471b19e34f081d72c7", 0xc0}, {&(0x7f0000000580)="a36be43cfe6541fb85486d6ba2610eba0a17c43e041a4a714c518e39360dcacbb9d008cb91fd8e1c544beb426370e8a07e6519b6f124c9e40d3efb51df7abb4e87ac4b3c0c8198df922beed2a3d3de402835e7b6f7d2c33c982cceae2b120eee78f52e88ac12d2fd52ba053fd55096ea4b78be3316162114ae92d6d0d959eb3b63834337fd15742385b1ed00fd1223dbcdd475a8f606", 0x96}, {&(0x7f0000000640)="ba3db1", 0x3}, {&(0x7f0000000680)="0d01aae0c7ced7c0bba7b1f901272cc387a01581e07102074e7d4bcd63e490ecc30e07fdc00ff152de99be941f1c015ecafada61e39aef7163c338ac8c54a9535df52b9d7ef8ff4400f90970b91aec1c674faf6c71e1a0179e34878b1a1abf1f1cb91bd9d392", 0x66}, {&(0x7f0000000700)="ba7f17a1995120022d119c7bf727d2dd69f3335acdfeca76483c415674d0211bbac7864a801d6b9463386207ef113fbf873ee586b93a5e22a641199eb217c7985995be2ae4770cf9a3f47d4c6ee4db35ae3934c9358b518c4b54b2de0266cfefd3663aa57f325b", 0x67}], 0x8, &(0x7f0000000800)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f5}}, @ip_retopts={{0x44, 0x0, 0x7, {[@rr={0x7, 0xb, 0x2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x6]}, @end, @generic={0x89, 0xf, "9dc3aa0600c2d478f596c6067c"}, @lsrr={0x83, 0x17, 0x7f, [@empty, @multicast2, @rand_addr=0x101, @broadcast, @loopback]}]}}}], 0x90}, 0x1000) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000701000/0x1000)=nil, 0x1000}, 0x2}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x80000) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000040)=""/19, 0x13, 0x401, 0x2, 0x4, 0x3f, 0x8}, 0x120) [ 450.924783] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='attr\x00') ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') sendfile(r0, r1, 0x0, 0x1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f00000002c0)="cbf2899576cdb0560ae65e4292b59b0c6c89000726fb36080f9729a5821eaa7610319aac01d92b396c6d689571af99ffd27676c4ea036a3b56c291ec3e2903afdfe3f583c42c00d27991b26c2d8e559d6bf6cf7beb476bfe718bd1941155d79f0bd516d578abf347d5435a68ff3b3efebff934a04ce0d3fe58c3b232c05fcfba05dc715cbf173d037a", 0x89, 0x10, &(0x7f0000000000)={0x9, @remote={[], 0x1}}, 0x12) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x210200, 0x0) dup2(r2, r3) ioctl$TIOCEXCL(r2, 0x540c) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 13:51:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @pix={0x0, 0x1f, 0x0, 0x0, 0xe0}}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x4000000000141042, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 451.455535] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffffffffffff69, &(0x7f0000000380), 0x0, 0x0, 0x2}, 0x40) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) socket$inet6(0xa, 0x5, 0x1) 13:51:10 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) socketpair(0x1e, 0xa, 0xfc, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0, &(0x7f0000000400)=""/21, 0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}, 0x40) close(r0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)) gettid() r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/167, 0xa7, 0x2, &(0x7f0000000140)={0x77359400}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x280401, 0x0) getcwd(&(0x7f0000000180)=""/79, 0x4f) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x1, 0x4, 0x2000000, {0x0, 0x7530}, {0x5, 0xd, 0x1, 0x9, 0x4, 0x0, "d2dd5420"}, 0x401, 0x2, @offset=0x57e, 0x4}) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{}, "f7443d9598ba300f", "a9bd3433bb8f330760a4c20b8a6dff2a", "8ec4d6d4", "c5887be9de8f410c"}, 0x28) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'\x00', r4}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:51:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x404000, 0x0) write$selinux_context(r1, &(0x7f0000000040)='system_u:object_r:klogd_exec_t:s0\x00', 0x22) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:10 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x480800, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0xa) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x2) dup2(r6, r7) accept4$inet(r6, &(0x7f0000000240)={0x2, 0x0, @remote}, &(0x7f00000002c0)=0x10, 0x800) getsockopt$bt_hci(r5, 0x0, 0x1, &(0x7f0000000080)=""/86, &(0x7f0000000180)=0x56) 13:51:10 executing program 0: sched_setattr(0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30db27f407"], 0x70ad) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, 0x0, 0x0) 13:51:10 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) socket(0x10, 0xa, 0xd6) 13:51:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 454.073689] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x5, 0x3, 0x13, 0x6, 0x9b, "4c7aa2805a9fb3cdb77b3ca3b9a76e44c9c8a8638b55eb4a4dc0ff2a775ae03fb8bb7c1d0be1ccbd8eb47c9589de4dd564071bcfdaf28869d45d7e0cec32858513618a47393856dc38000b7d725b2acf735c0a4c8d711a1347efaeee1cee9bcf429e3f3c532a0a21d2f4db94337c36b83382aa0284bbe32723be49c9be699aaa915c530845ddb34c481e51c125284441535db710caedafd5b438e4"}, 0xa5, 0x4f8382c6481e5b6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r6}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000280)={r6, 0x3, 0xab, "1a983f1d898e9f8508c75c982a80f4edcb4d02b049df200e83659cfc6b3c72c72501c24753894b8051b1ac4b54386d6845387691e0f69e16398d1615dac63b9afe6c823ad7beeb312e928e3b64ee5681453cb78a978f5b1eb617504c7c1a5652636dc647b9eab8b2d1ebff1ec298974793ddcb560bbdfdac0b47de7e3364ea523c5d84593630695e75e7dc0fec5cf9666e519c132093395cf14222bf961a1ac7838fa9fbd581ad0cd97ea0"}, 0xb3) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r8, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='caif0\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 454.273187] device nr0 entered promiscuous mode 13:51:10 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000340)={0x1f, {0x6, 0x7f, 0xf8, 0x3, 0x3, 0x6}}, 0x8) r1 = socket$kcm(0x10, 0x4, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000180)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)="ab590fc64dfdbbe9c45c25e0a8f07b450c11dc71e51e4bbf152e646ee519950c0713cfb567390fbfd6c8a4f4521eaec5e81f71def47c933af61361a65ce80193a2ad698e77060863228c700f9db1a14b6368ea3074df0cd75f538aa6d503733b042d6567cd9a2a2ffad75fa8ef46e05369aa69c00de8279a2ceaf62d20773a99c181ce8c17d003f75e50d074a02279c30f253d8ccd0a616e26d3670df15cc28fef36f15071a28cd0aea6f40d31193565a6b507eb7704cfcf7749978e97f82a0d84601586d1550d062f6fa6b7244d91c009e2cdae", 0xd4}], 0x1}, 0x20000000) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f0000000500)={0x16, 0x98, 0xfa00, {&(0x7f00000004c0), 0x1, r6, 0x10, 0x0, @in={0x2, 0x4e23, @remote}}}, 0xa0) dup2(r7, r8) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/seminux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) write$RDMA_USER_CM_CMD_ACCEPT(r11, &(0x7f0000000640)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "eed769cbf21fa65b58d0c1a96ecfed4122f61366350a77788442b39e2d6237783bac9d279cf8babd65bdaad22661e38363005cec25cc60f9b0f5f664c62ee95c873c1ab8d5cb18ea32d37bc0b36e0d4b1df2b5c92ec9baa6367293de5f484a3ca604f4ef0ec1693319470fa98c507bb6f026ec0744e9b0e14716eafe1cdaf00a6e4d17f6469bf670a46e6906f2932ce13fde53b24cefe80f00e03be67223c27f911f4c78cd8890a8c9f4849e50438a76d981993fa7ab38cffb2bc0ac4820257734dae16b63053842ca2ef1a6e5935c7997f2cf9dec22c9aff22b9e9bf450a182e33d598444e00cded7d5ad326b556d2f8161dfcb158f2887866f69467c405f2c", 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x0, 0xfe}, r6}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x2, {0xa, 0x4e20, 0x4, @local, 0xa48}, r6}}, 0x38) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) [ 454.390500] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p [ 454.581097] kauditd_printk_skb: 363 callbacks suppressed [ 454.581106] audit: type=1400 audit(1576158670.644:11792): avc: denied { map } for pid=16453 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:51:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 454.758168] audit: type=1400 audit(1576158670.674:11793): avc: denied { map } for pid=16453 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 454.907985] audit: type=1400 audit(1576158670.704:11794): avc: denied { map } for pid=16459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 454.930182] loop4: partition table partially beyond EOD, truncated [ 454.931183] loop4: p1 size 2 extends beyond EOD, truncated [ 455.000890] loop4: p4 start 1854537728 is beyond EOD, truncated [ 455.007012] loop4: p5 start 1854537728 is beyond EOD, truncated [ 455.042455] loop4: p6 start 1854537728 is beyond EOD, truncated [ 455.075089] audit: type=1400 audit(1576158670.704:11795): avc: denied { map } for pid=16453 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 455.086636] loop4: p7 start 1854537728 is beyond EOD, [ 455.131366] bond0: caif0 ether type (0) is different from other slaves (1), can not enslave it [ 455.157889] truncated [ 455.187511] loop4: p8 start 1854537728 is beyond EOD, truncated [ 455.202646] bond0: caif0 ether type (0) is different from other slaves (1), can not enslave it [ 455.235773] loop4: p9 start 1854537728 is beyond EOD, truncated [ 455.240540] audit: type=1400 audit(1576158670.714:11796): avc: denied { map } for pid=16459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 455.282193] loop4: p10 start 1854537728 is beyond EOD, truncated 13:51:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 455.314275] loop4: p11 start 1854537728 is beyond EOD, truncated [ 455.364547] loop4: p12 start 1854537728 is beyond EOD, truncated [ 455.398988] loop4: p13 start 1854537728 is beyond EOD, truncated [ 455.428646] loop4: p14 start 1854537728 is beyond EOD, truncated [ 455.429509] audit: type=1400 audit(1576158670.714:11797): avc: denied { map } for pid=16453 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 455.463718] loop4: p15 start 1854537728 is beyond EOD, truncated [ 455.484567] loop4: p16 start 1854537728 is beyond EOD, truncated [ 455.511388] loop4: p17 start 1854537728 is beyond EOD, truncated [ 455.567134] loop4: p18 start 1854537728 is beyond EOD, truncated [ 455.640174] loop4: p19 start 1854537728 is beyond EOD, truncated [ 455.641445] audit: type=1400 audit(1576158670.724:11798): avc: denied { map } for pid=16459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 455.661655] device nr0 entered promiscuous mode [ 455.722661] loop4: p20 start 1854537728 is beyond EOD, truncated [ 455.746124] audit: audit_backlog=65 > audit_backlog_limit=64 [ 455.753538] audit: type=1400 audit(1576158670.754:11799): avc: denied { map } for pid=16459 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 455.768149] loop4: p21 start 1854537728 is beyond EOD, [ 455.777794] audit: audit_lost=211 audit_rate_limit=0 audit_backlog_limit=64 [ 455.819848] truncated [ 455.831496] loop4: p22 start 1854537728 is beyond EOD, truncated [ 455.865722] loop4: p23 start 1854537728 is beyond EOD, truncated [ 455.895885] loop4: p24 start 1854537728 is beyond EOD, truncated [ 455.922900] loop4: p25 start 1854537728 is beyond EOD, truncated [ 455.950421] loop4: p26 start 1854537728 is beyond EOD, truncated [ 455.970193] loop4: p27 start 1854537728 is beyond EOD, truncated [ 455.994409] loop4: p28 start 1854537728 is beyond EOD, truncated [ 456.030209] loop4: p29 start 1854537728 is beyond EOD, truncated [ 456.060121] loop4: p30 start 1854537728 is beyond EOD, truncated [ 456.086622] loop4: p31 start 1854537728 is beyond EOD, truncated [ 456.114109] loop4: p32 start 1854537728 is beyond EOD, truncated [ 456.140421] loop4: p33 start 1854537728 is beyond EOD, truncated [ 456.166944] loop4: p34 start 1854537728 is beyond EOD, truncated [ 456.190093] loop4: p35 start 1854537728 is beyond EOD, truncated [ 456.210090] loop4: p36 start 1854537728 is beyond EOD, truncated [ 456.230370] loop4: p37 start 1854537728 is beyond EOD, truncated [ 456.244441] loop4: p38 start 1854537728 is beyond EOD, truncated [ 456.252603] loop4: p39 start 1854537728 is beyond EOD, truncated [ 456.258839] loop4: p40 start 1854537728 is beyond EOD, truncated [ 456.266112] loop4: p41 start 1854537728 is beyond EOD, truncated [ 456.272394] loop4: p42 start 1854537728 is beyond EOD, truncated [ 456.278652] loop4: p43 start 1854537728 is beyond EOD, truncated [ 456.285894] loop4: p44 start 1854537728 is beyond EOD, truncated [ 456.292435] loop4: p45 start 1854537728 is beyond EOD, truncated [ 456.298702] loop4: p46 start 1854537728 is beyond EOD, truncated [ 456.305938] loop4: p47 start 1854537728 is beyond EOD, truncated [ 456.313456] loop4: p48 start 1854537728 is beyond EOD, truncated [ 456.327689] loop4: p49 start 1854537728 is beyond EOD, truncated [ 456.339981] loop4: p50 start 1854537728 is beyond EOD, truncated [ 456.347335] loop4: p51 start 1854537728 is beyond EOD, truncated [ 456.353601] loop4: p52 start 1854537728 is beyond EOD, truncated [ 456.359839] loop4: p53 start 1854537728 is beyond EOD, truncated [ 456.367120] loop4: p54 start 1854537728 is beyond EOD, truncated [ 456.373628] loop4: p55 start 1854537728 is beyond EOD, truncated 13:51:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 456.379832] loop4: p56 start 1854537728 is beyond EOD, truncated [ 456.388197] loop4: p57 start 1854537728 is beyond EOD, truncated [ 456.399933] loop4: p58 start 1854537728 is beyond EOD, truncated [ 456.413956] loop4: p59 start 1854537728 is beyond EOD, truncated [ 456.433755] loop4: p60 start 1854537728 is beyond EOD, truncated [ 456.440725] loop4: p61 start 1854537728 is beyond EOD, truncated [ 456.447007] loop4: p62 start 1854537728 is beyond EOD, truncated [ 456.453847] loop4: p63 start 1854537728 is beyond EOD, truncated [ 456.490118] loop4: p64 start 1854537728 is beyond EOD, truncated [ 456.496373] loop4: p65 start 1854537728 is beyond EOD, truncated [ 456.523977] loop4: p66 start 1854537728 is beyond EOD, truncated [ 456.530271] loop4: p67 start 1854537728 is beyond EOD, truncated [ 456.536443] loop4: p68 start 1854537728 is beyond EOD, truncated [ 456.542986] loop4: p69 start 1854537728 is beyond EOD, truncated [ 456.549238] loop4: p70 start 1854537728 is beyond EOD, truncated [ 456.549248] loop4: p71 start 1854537728 is beyond EOD, truncated [ 456.549255] loop4: p72 start 1854537728 is beyond EOD, truncated [ 456.549264] loop4: p73 start 1854537728 is beyond EOD, truncated [ 456.549273] loop4: p74 start 1854537728 is beyond EOD, truncated [ 456.549280] loop4: p75 start 1854537728 is beyond EOD, truncated [ 456.586834] loop4: p76 start 1854537728 is beyond EOD, truncated [ 456.598026] loop4: p77 start 1854537728 is beyond EOD, truncated [ 456.615834] loop4: p78 start 1854537728 is beyond EOD, truncated [ 456.625942] loop4: p79 start 1854537728 is beyond EOD, truncated [ 456.646158] loop4: p80 start 1854537728 is beyond EOD, truncated [ 456.652471] loop4: p81 start 1854537728 is beyond EOD, truncated [ 456.671841] loop4: p82 start 1854537728 is beyond EOD, truncated [ 456.678538] loop4: p83 start 1854537728 is beyond EOD, truncated [ 456.705132] loop4: p84 start 1854537728 is beyond EOD, truncated [ 456.724243] loop4: p85 start 1854537728 is beyond EOD, truncated [ 456.751035] loop4: p86 start 1854537728 is beyond EOD, truncated [ 456.787693] loop4: p87 start 1854537728 is beyond EOD, truncated [ 456.828236] loop4: p88 start 1854537728 is beyond EOD, truncated [ 456.835119] loop4: p89 start 1854537728 is beyond EOD, truncated [ 456.862605] loop4: p90 start 1854537728 is beyond EOD, truncated [ 456.868839] loop4: p91 start 1854537728 is beyond EOD, truncated [ 456.889168] loop4: p92 start 1854537728 is beyond EOD, truncated [ 456.906417] loop4: p93 start 1854537728 is beyond EOD, truncated [ 456.914716] loop4: p94 start 1854537728 is beyond EOD, truncated [ 456.931169] loop4: p95 start 1854537728 is beyond EOD, truncated [ 456.937361] loop4: p96 start 1854537728 is beyond EOD, truncated [ 456.961052] loop4: p97 start 1854537728 is beyond EOD, truncated [ 456.971092] loop4: p98 start 1854537728 is beyond EOD, truncated [ 456.977284] loop4: p99 start 1854537728 is beyond EOD, truncated [ 457.000086] loop4: p100 start 1854537728 is beyond EOD, truncated [ 457.006386] loop4: p101 start 1854537728 is beyond EOD, truncated [ 457.030781] loop4: p102 start 1854537728 is beyond EOD, truncated [ 457.037077] loop4: p103 start 1854537728 is beyond EOD, truncated [ 457.052376] loop4: p104 start 1854537728 is beyond EOD, truncated [ 457.058666] loop4: p105 start 1854537728 is beyond EOD, truncated [ 457.110074] loop4: p106 start 1854537728 is beyond EOD, truncated [ 457.116377] loop4: p107 start 1854537728 is beyond EOD, truncated [ 457.130819] loop4: p108 start 1854537728 is beyond EOD, truncated [ 457.141112] loop4: p109 start 1854537728 is beyond EOD, truncated [ 457.147390] loop4: p110 start 1854537728 is beyond EOD, truncated [ 457.170083] loop4: p111 start 1854537728 is beyond EOD, truncated [ 457.176374] loop4: p112 start 1854537728 is beyond EOD, truncated [ 457.189029] loop4: p113 start 1854537728 is beyond EOD, truncated [ 457.198176] loop4: p114 start 1854537728 is beyond EOD, truncated [ 457.205496] loop4: p115 start 1854537728 is beyond EOD, truncated [ 457.212012] loop4: p116 start 1854537728 is beyond EOD, truncated [ 457.218427] loop4: p117 start 1854537728 is beyond EOD, truncated [ 457.226375] loop4: p118 start 1854537728 is beyond EOD, truncated [ 457.232790] loop4: p119 start 1854537728 is beyond EOD, truncated [ 457.239033] loop4: p120 start 1854537728 is beyond EOD, truncated [ 457.246462] loop4: p121 start 1854537728 is beyond EOD, truncated [ 457.265284] loop4: p122 start 1854537728 is beyond EOD, truncated [ 457.271989] loop4: p123 start 1854537728 is beyond EOD, truncated [ 457.278339] loop4: p124 start 1854537728 is beyond EOD, truncated [ 457.289580] loop4: p125 start 1854537728 is beyond EOD, truncated [ 457.296037] loop4: p126 start 1854537728 is beyond EOD, truncated [ 457.307026] loop4: p127 start 1854537728 is beyond EOD, truncated [ 457.313412] loop4: p128 start 1854537728 is beyond EOD, truncated [ 457.319677] loop4: p129 start 1854537728 is beyond EOD, truncated [ 457.330327] loop4: p130 start 1854537728 is beyond EOD, truncated [ 457.336592] loop4: p131 start 1854537728 is beyond EOD, truncated [ 457.347292] loop4: p132 start 1854537728 is beyond EOD, truncated [ 457.354297] loop4: p133 start 1854537728 is beyond EOD, truncated [ 457.366145] loop4: p134 start 1854537728 is beyond EOD, truncated [ 457.384553] loop4: p135 start 1854537728 is beyond EOD, truncated [ 457.390970] loop4: p136 start 1854537728 is beyond EOD, truncated [ 457.397236] loop4: p137 start 1854537728 is beyond EOD, truncated [ 457.408005] loop4: p138 start 1854537728 is beyond EOD, truncated [ 457.414377] loop4: p139 start 1854537728 is beyond EOD, truncated [ 457.425062] loop4: p140 start 1854537728 is beyond EOD, truncated [ 457.432197] loop4: p141 start 1854537728 is beyond EOD, truncated [ 457.438490] loop4: p142 start 1854537728 is beyond EOD, truncated [ 457.449069] loop4: p143 start 1854537728 is beyond EOD, truncated [ 457.455588] loop4: p144 start 1854537728 is beyond EOD, truncated [ 457.466516] loop4: p145 start 1854537728 is beyond EOD, truncated [ 457.473034] loop4: p146 start 1854537728 is beyond EOD, truncated [ 457.479283] loop4: p147 start 1854537728 is beyond EOD, truncated [ 457.489884] loop4: p148 start 1854537728 is beyond EOD, truncated [ 457.496262] loop4: p149 start 1854537728 is beyond EOD, truncated [ 457.506976] loop4: p150 start 1854537728 is beyond EOD, truncated [ 457.515502] loop4: p151 start 1854537728 is beyond EOD, truncated [ 457.526215] loop4: p152 start 1854537728 is beyond EOD, truncated [ 457.532505] loop4: p153 start 1854537728 is beyond EOD, truncated [ 457.538740] loop4: p154 start 1854537728 is beyond EOD, truncated [ 457.549555] loop4: p155 start 1854537728 is beyond EOD, truncated [ 457.555929] loop4: p156 start 1854537728 is beyond EOD, truncated [ 457.566630] loop4: p157 start 1854537728 is beyond EOD, truncated [ 457.573004] loop4: p158 start 1854537728 is beyond EOD, truncated [ 457.579293] loop4: p159 start 1854537728 is beyond EOD, truncated [ 457.589863] loop4: p160 start 1854537728 is beyond EOD, truncated [ 457.596319] loop4: p161 start 1854537728 is beyond EOD, truncated [ 457.607127] loop4: p162 start 1854537728 is beyond EOD, truncated [ 457.613512] loop4: p163 start 1854537728 is beyond EOD, truncated [ 457.619778] loop4: p164 start 1854537728 is beyond EOD, truncated [ 457.630980] loop4: p165 start 1854537728 is beyond EOD, truncated [ 457.637290] loop4: p166 start 1854537728 is beyond EOD, truncated [ 457.647369] loop4: p167 start 1854537728 is beyond EOD, truncated [ 457.654471] loop4: p168 start 1854537728 is beyond EOD, truncated [ 457.670844] loop4: p169 start 1854537728 is beyond EOD, truncated [ 457.677229] loop4: p170 start 1854537728 is beyond EOD, truncated [ 457.687516] loop4: p171 start 1854537728 is beyond EOD, truncated [ 457.694815] loop4: p172 start 1854537728 is beyond EOD, truncated [ 457.704740] loop4: p173 start 1854537728 is beyond EOD, truncated [ 457.712070] loop4: p174 start 1854537728 is beyond EOD, truncated [ 457.718441] loop4: p175 start 1854537728 is beyond EOD, truncated [ 457.728816] loop4: p176 start 1854537728 is beyond EOD, truncated [ 457.735904] loop4: p177 start 1854537728 is beyond EOD, truncated [ 457.746048] loop4: p178 start 1854537728 is beyond EOD, truncated [ 457.753101] loop4: p179 start 1854537728 is beyond EOD, truncated [ 457.759595] loop4: p180 start 1854537728 is beyond EOD, truncated [ 457.769854] loop4: p181 start 1854537728 is beyond EOD, truncated [ 457.776997] loop4: p182 start 1854537728 is beyond EOD, truncated [ 457.787006] loop4: p183 start 1854537728 is beyond EOD, truncated [ 457.794150] loop4: p184 start 1854537728 is beyond EOD, truncated [ 457.804144] loop4: p185 start 1854537728 is beyond EOD, truncated [ 457.810696] loop4: p186 start 1854537728 is beyond EOD, truncated [ 457.816969] loop4: p187 start 1854537728 is beyond EOD, truncated [ 457.823412] loop4: p188 start 1854537728 is beyond EOD, truncated [ 457.829932] loop4: p189 start 1854537728 is beyond EOD, truncated [ 457.836483] loop4: p190 start 1854537728 is beyond EOD, truncated [ 457.846571] loop4: p191 start 1854537728 is beyond EOD, truncated [ 457.853176] loop4: p192 start 1854537728 is beyond EOD, truncated [ 457.859666] loop4: p193 start 1854537728 is beyond EOD, truncated [ 457.866243] loop4: p194 start 1854537728 is beyond EOD, truncated [ 457.872830] loop4: p195 start 1854537728 is beyond EOD, truncated [ 457.879189] loop4: p196 start 1854537728 is beyond EOD, truncated [ 457.885767] loop4: p197 start 1854537728 is beyond EOD, truncated [ 457.892322] loop4: p198 start 1854537728 is beyond EOD, truncated [ 457.898605] loop4: p199 start 1854537728 is beyond EOD, truncated [ 457.905187] loop4: p200 start 1854537728 is beyond EOD, truncated [ 457.911861] loop4: p201 start 1854537728 is beyond EOD, truncated [ 457.918131] loop4: p202 start 1854537728 is beyond EOD, truncated [ 457.924629] loop4: p203 start 1854537728 is beyond EOD, truncated [ 457.931300] loop4: p204 start 1854537728 is beyond EOD, truncated [ 457.937539] loop4: p205 start 1854537728 is beyond EOD, truncated [ 457.943879] loop4: p206 start 1854537728 is beyond EOD, truncated [ 457.950381] loop4: p207 start 1854537728 is beyond EOD, truncated [ 457.956692] loop4: p208 start 1854537728 is beyond EOD, truncated [ 457.963008] loop4: p209 start 1854537728 is beyond EOD, truncated [ 457.969595] loop4: p210 start 1854537728 is beyond EOD, truncated [ 457.976146] loop4: p211 start 1854537728 is beyond EOD, truncated [ 457.982640] loop4: p212 start 1854537728 is beyond EOD, truncated [ 457.988886] loop4: p213 start 1854537728 is beyond EOD, truncated [ 457.995240] loop4: p214 start 1854537728 is beyond EOD, truncated [ 458.001757] loop4: p215 start 1854537728 is beyond EOD, truncated [ 458.008002] loop4: p216 start 1854537728 is beyond EOD, truncated [ 458.014338] loop4: p217 start 1854537728 is beyond EOD, truncated [ 458.020932] loop4: p218 start 1854537728 is beyond EOD, truncated [ 458.027177] loop4: p219 start 1854537728 is beyond EOD, truncated [ 458.045847] loop4: p220 start 1854537728 is beyond EOD, truncated [ 458.058607] loop4: p221 start 1854537728 is beyond EOD, truncated [ 458.071844] loop4: p222 start 1854537728 is beyond EOD, truncated [ 458.078136] loop4: p223 start 1854537728 is beyond EOD, truncated [ 458.100204] loop4: p224 start 1854537728 is beyond EOD, truncated [ 458.106512] loop4: p225 start 1854537728 is beyond EOD, truncated [ 458.121694] loop4: p226 start 1854537728 is beyond EOD, truncated [ 458.127992] loop4: p227 start 1854537728 is beyond EOD, truncated [ 458.135776] loop4: p228 start 1854537728 is beyond EOD, truncated [ 458.151369] loop4: p229 start 1854537728 is beyond EOD, truncated [ 458.157661] loop4: p230 start 1854537728 is beyond EOD, truncated [ 458.175111] loop4: p231 start 1854537728 is beyond EOD, truncated [ 458.200169] loop4: p232 start 1854537728 is beyond EOD, truncated [ 458.206518] loop4: p233 start 1854537728 is beyond EOD, truncated [ 458.217279] loop4: p234 start 1854537728 is beyond EOD, truncated [ 458.223814] loop4: p235 start 1854537728 is beyond EOD, truncated [ 458.236402] loop4: p236 start 1854537728 is beyond EOD, truncated [ 458.243676] loop4: p237 start 1854537728 is beyond EOD, truncated [ 458.249956] loop4: p238 start 1854537728 is beyond EOD, truncated [ 458.261587] loop4: p239 start 1854537728 is beyond EOD, truncated [ 458.267970] loop4: p240 start 1854537728 is beyond EOD, truncated [ 458.278143] loop4: p241 start 1854537728 is beyond EOD, truncated [ 458.284620] loop4: p242 start 1854537728 is beyond EOD, truncated [ 458.291227] loop4: p243 start 1854537728 is beyond EOD, truncated [ 458.297696] loop4: p244 start 1854537728 is beyond EOD, truncated [ 458.304290] loop4: p245 start 1854537728 is beyond EOD, truncated [ 458.310826] loop4: p246 start 1854537728 is beyond EOD, truncated [ 458.317095] loop4: p247 start 1854537728 is beyond EOD, truncated [ 458.323698] loop4: p248 start 1854537728 is beyond EOD, truncated [ 458.330258] loop4: p249 start 1854537728 is beyond EOD, truncated [ 458.336533] loop4: p250 start 1854537728 is beyond EOD, truncated [ 458.343063] loop4: p251 start 1854537728 is beyond EOD, truncated [ 458.349556] loop4: p252 start 1854537728 is beyond EOD, truncated [ 458.356086] loop4: p253 start 1854537728 is beyond EOD, truncated [ 458.362556] loop4: p254 start 1854537728 is beyond EOD, truncated [ 458.368875] loop4: p255 start 1854537728 is beyond EOD, truncated 13:51:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x11}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x26c59}], 0x1}, 0x60) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000040)={0x9, 0x800}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 13:51:14 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x56, 0x0, 0x119}, 0x0) 13:51:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/dev/capi20\x00'}, {0x20, 'self7ppp0'}, {0x20, '$cpuset\x00'}, {0x20, '\xfb'}, {0x20, '/dev/ashmem\x00'}, {0x20, '/selinux/checkreqprot\x00'}, {0x20, '/dev/capi20\x00'}], 0xa, "22f044b69f8ffba71f2773b3dca068df80d8380f3d76a5c7f9d8262fd6b90425464d24b8d71315ba35f346683953136b2ec4288145169834e460550afec73a4955375f1d1cbebf5e4383d2fcd538f9ecc86d358ad661c87fac42ad4414d8b7767633fce1378e8a0426d0a1c2b10702c7f81efaf3383e9284b831aacc566d58cdd39cf730680d388740b07a33142fed6528ce18d81f6f2bf827d1b5e4c81d7e5a03bbe23ceaa2d536e3c0d77a5e254116f6fd66cd0009e042c450f705489ab78ebc9ca11b67d9d514cc9e0c53"}, 0x12a) 13:51:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:14 executing program 0: sched_setattr(0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30db27f407"], 0x70ad) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, 0x0, 0x0) 13:51:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) socket(0x10, 0xa, 0xd6) [ 459.046585] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x100000000) [ 459.151875] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:15 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x82000, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd676e0d720d317bd27272d5e93ca35a4596a1b05287a019a027326e8da8232358802c77cd62297f22b89d8f7b1cb5a72f442c7d30fe52a40a11f2d1ce7e2eb107049e", 0x70}], 0x1}, 0x6024890) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) [ 459.316374] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p [ 459.602907] kauditd_printk_skb: 318 callbacks suppressed [ 459.602917] audit: type=1400 audit(1576158675.664:12102): avc: denied { map } for pid=16532 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 459.773495] audit: type=1400 audit(1576158675.674:12103): avc: denied { map } for pid=16530 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:51:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:15 executing program 0: sched_setattr(0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30db27f407"], 0x70ad) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, 0x0, 0x0) [ 459.919623] loop4: partition table partially beyond EOD, truncated 13:51:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) setsockopt$inet6_int(r1, 0x29, 0x1, &(0x7f0000000000)=0x6d8c, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 459.968894] loop4: p1 size 2 extends beyond EOD, truncated [ 459.998961] audit: type=1400 audit(1576158675.674:12104): avc: denied { map } for pid=16530 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 460.034203] loop4: p4 start 1854537728 is beyond EOD, truncated [ 460.063728] loop4: p5 start 1854537728 is beyond EOD, truncated [ 460.111740] loop4: p6 start 1854537728 is beyond EOD, truncated [ 460.117883] loop4: p7 start 1854537728 is beyond EOD, truncated [ 460.152042] audit: type=1400 audit(1576158675.694:12105): avc: denied { map } for pid=16530 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 460.180087] loop4: p8 start 1854537728 is beyond EOD, truncated [ 460.186220] loop4: p9 start 1854537728 is beyond EOD, truncated [ 460.253712] loop4: p10 start 1854537728 is beyond EOD, truncated [ 460.279529] loop4: p11 start 1854537728 is beyond EOD, truncated [ 460.291149] audit: type=1400 audit(1576158675.694:12106): avc: denied { map } for pid=16530 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 460.327734] loop4: p12 start 1854537728 is beyond EOD, truncated [ 460.359203] loop4: p13 start 1854537728 is beyond EOD, truncated [ 460.397520] loop4: p14 start 1854537728 is beyond EOD, truncated [ 460.456829] loop4: p15 start 1854537728 is beyond EOD, truncated [ 460.467122] audit: type=1400 audit(1576158675.704:12107): avc: denied { map } for pid=16531 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 460.536735] loop4: p16 start 1854537728 is beyond EOD, truncated [ 460.578150] loop4: p17 start 1854537728 is beyond EOD, truncated [ 460.613373] loop4: p18 start 1854537728 is beyond EOD, truncated [ 460.647327] loop4: p19 start 1854537728 is beyond EOD, truncated [ 460.656643] audit: type=1400 audit(1576158675.704:12108): avc: denied { map } for pid=16531 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 460.689225] audit: audit_backlog=65 > audit_backlog_limit=64 [ 460.689729] audit: audit_backlog=65 > audit_backlog_limit=64 [ 460.691694] audit: audit_backlog=65 > audit_backlog_limit=64 [ 460.737119] device nr0 entered promiscuous mode [ 460.746866] loop4: p20 start 1854537728 is beyond EOD, truncated [ 460.833363] loop4: p21 start 1854537728 is beyond EOD, truncated [ 460.874509] loop4: p22 start 1854537728 is beyond EOD, truncated [ 460.905342] loop4: p23 start 1854537728 is beyond EOD, truncated [ 460.931101] loop4: p24 start 1854537728 is beyond EOD, truncated [ 460.970092] loop4: p25 start 1854537728 is beyond EOD, truncated [ 460.999962] loop4: p26 start 1854537728 is beyond EOD, truncated [ 461.038998] loop4: p27 start 1854537728 is beyond EOD, truncated [ 461.076485] loop4: p28 start 1854537728 is beyond EOD, truncated [ 461.101643] loop4: p29 start 1854537728 is beyond EOD, truncated [ 461.128899] loop4: p30 start 1854537728 is beyond EOD, truncated [ 461.146707] loop4: p31 start 1854537728 is beyond EOD, truncated [ 461.154772] loop4: p32 start 1854537728 is beyond EOD, truncated [ 461.163355] loop4: p33 start 1854537728 is beyond EOD, truncated [ 461.188859] loop4: p34 start 1854537728 is beyond EOD, truncated [ 461.204569] loop4: p35 start 1854537728 is beyond EOD, truncated [ 461.228019] loop4: p36 start 1854537728 is beyond EOD, truncated [ 461.252327] loop4: p37 start 1854537728 is beyond EOD, truncated [ 461.279069] loop4: p38 start 1854537728 is beyond EOD, truncated [ 461.305735] loop4: p39 start 1854537728 is beyond EOD, truncated [ 461.333304] loop4: p40 start 1854537728 is beyond EOD, truncated [ 461.353426] loop4: p41 start 1854537728 is beyond EOD, truncated [ 461.372052] loop4: p42 start 1854537728 is beyond EOD, truncated [ 461.378344] loop4: p43 start 1854537728 is beyond EOD, truncated [ 461.385830] loop4: p44 start 1854537728 is beyond EOD, truncated [ 461.392199] loop4: p45 start 1854537728 is beyond EOD, truncated [ 461.398443] loop4: p46 start 1854537728 is beyond EOD, truncated [ 461.405910] loop4: p47 start 1854537728 is beyond EOD, truncated [ 461.412447] loop4: p48 start 1854537728 is beyond EOD, truncated [ 461.423683] loop4: p49 start 1854537728 is beyond EOD, truncated [ 461.439587] loop4: p50 start 1854537728 is beyond EOD, truncated [ 461.447903] loop4: p51 start 1854537728 is beyond EOD, truncated [ 461.456724] loop4: p52 start 1854537728 is beyond EOD, truncated [ 461.463046] loop4: p53 start 1854537728 is beyond EOD, truncated [ 461.481389] loop4: p54 start 1854537728 is beyond EOD, truncated [ 461.493344] loop4: p55 start 1854537728 is beyond EOD, truncated [ 461.506413] loop4: p56 start 1854537728 is beyond EOD, truncated [ 461.512885] loop4: p57 start 1854537728 is beyond EOD, truncated [ 461.519129] loop4: p58 start 1854537728 is beyond EOD, truncated [ 461.526738] loop4: p59 start 1854537728 is beyond EOD, truncated [ 461.533047] loop4: p60 start 1854537728 is beyond EOD, truncated [ 461.539287] loop4: p61 start 1854537728 is beyond EOD, truncated [ 461.547232] loop4: p62 start 1854537728 is beyond EOD, truncated [ 461.553567] loop4: p63 start 1854537728 is beyond EOD, truncated [ 461.559806] loop4: p64 start 1854537728 is beyond EOD, truncated [ 461.567120] loop4: p65 start 1854537728 is beyond EOD, truncated [ 461.573455] loop4: p66 start 1854537728 is beyond EOD, truncated [ 461.579721] loop4: p67 start 1854537728 is beyond EOD, truncated [ 461.587076] loop4: p68 start 1854537728 is beyond EOD, truncated [ 461.593398] loop4: p69 start 1854537728 is beyond EOD, truncated [ 461.599824] loop4: p70 start 1854537728 is beyond EOD, truncated [ 461.633323] loop4: p71 start 1854537728 is beyond EOD, truncated [ 461.647786] loop4: p72 start 1854537728 is beyond EOD, truncated [ 461.662219] loop4: p73 start 1854537728 is beyond EOD, truncated [ 461.675696] loop4: p74 start 1854537728 is beyond EOD, truncated [ 461.701442] loop4: p75 start 1854537728 is beyond EOD, truncated [ 461.725776] loop4: p76 start 1854537728 is beyond EOD, truncated [ 461.745559] loop4: p77 start 1854537728 is beyond EOD, truncated [ 461.766623] loop4: p78 start 1854537728 is beyond EOD, truncated [ 461.784308] loop4: p79 start 1854537728 is beyond EOD, truncated [ 461.796144] loop4: p80 start 1854537728 is beyond EOD, truncated [ 461.810243] loop4: p81 start 1854537728 is beyond EOD, truncated [ 461.823521] loop4: p82 start 1854537728 is beyond EOD, truncated [ 461.837785] loop4: p83 start 1854537728 is beyond EOD, truncated [ 461.850506] loop4: p84 start 1854537728 is beyond EOD, truncated [ 461.860220] loop4: p85 start 1854537728 is beyond EOD, truncated [ 461.866406] loop4: p86 start 1854537728 is beyond EOD, truncated [ 461.890106] loop4: p87 start 1854537728 is beyond EOD, truncated [ 461.896320] loop4: p88 start 1854537728 is beyond EOD, truncated [ 461.910857] loop4: p89 start 1854537728 is beyond EOD, truncated [ 461.917050] loop4: p90 start 1854537728 is beyond EOD, truncated [ 461.940928] loop4: p91 start 1854537728 is beyond EOD, truncated [ 461.958720] loop4: p92 start 1854537728 is beyond EOD, truncated [ 461.969220] loop4: p93 start 1854537728 is beyond EOD, truncated [ 461.981028] loop4: p94 start 1854537728 is beyond EOD, truncated [ 461.987266] loop4: p95 start 1854537728 is beyond EOD, truncated [ 461.997315] loop4: p96 start 1854537728 is beyond EOD, truncated [ 462.005105] loop4: p97 start 1854537728 is beyond EOD, truncated [ 462.015447] loop4: p98 start 1854537728 is beyond EOD, truncated [ 462.021850] loop4: p99 start 1854537728 is beyond EOD, truncated [ 462.028071] loop4: p100 start 1854537728 is beyond EOD, truncated [ 462.035595] loop4: p101 start 1854537728 is beyond EOD, truncated [ 462.042040] loop4: p102 start 1854537728 is beyond EOD, truncated [ 462.056325] loop4: p103 start 1854537728 is beyond EOD, truncated [ 462.064157] loop4: p104 start 1854537728 is beyond EOD, truncated [ 462.081647] loop4: p105 start 1854537728 is beyond EOD, truncated [ 462.087931] loop4: p106 start 1854537728 is beyond EOD, truncated [ 462.097222] loop4: p107 start 1854537728 is beyond EOD, truncated [ 462.105131] loop4: p108 start 1854537728 is beyond EOD, truncated [ 462.114453] loop4: p109 start 1854537728 is beyond EOD, truncated [ 462.122248] loop4: p110 start 1854537728 is beyond EOD, truncated [ 462.128496] loop4: p111 start 1854537728 is beyond EOD, truncated [ 462.137745] loop4: p112 start 1854537728 is beyond EOD, truncated [ 462.145540] loop4: p113 start 1854537728 is beyond EOD, truncated [ 462.154563] loop4: p114 start 1854537728 is beyond EOD, truncated [ 462.163210] loop4: p115 start 1854537728 is beyond EOD, truncated [ 462.169493] loop4: p116 start 1854537728 is beyond EOD, truncated [ 462.177949] loop4: p117 start 1854537728 is beyond EOD, truncated [ 462.184377] loop4: p118 start 1854537728 is beyond EOD, truncated [ 462.190694] loop4: p119 start 1854537728 is beyond EOD, truncated [ 462.197152] loop4: p120 start 1854537728 is beyond EOD, truncated [ 462.203489] loop4: p121 start 1854537728 is beyond EOD, truncated [ 462.209936] loop4: p122 start 1854537728 is beyond EOD, truncated [ 462.216287] loop4: p123 start 1854537728 is beyond EOD, truncated [ 462.223047] loop4: p124 start 1854537728 is beyond EOD, truncated [ 462.229647] loop4: p125 start 1854537728 is beyond EOD, truncated [ 462.235972] loop4: p126 start 1854537728 is beyond EOD, truncated [ 462.242542] loop4: p127 start 1854537728 is beyond EOD, truncated [ 462.248789] loop4: p128 start 1854537728 is beyond EOD, truncated [ 462.255125] loop4: p129 start 1854537728 is beyond EOD, truncated [ 462.261730] loop4: p130 start 1854537728 is beyond EOD, truncated [ 462.267976] loop4: p131 start 1854537728 is beyond EOD, truncated [ 462.274304] loop4: p132 start 1854537728 is beyond EOD, truncated [ 462.280837] loop4: p133 start 1854537728 is beyond EOD, truncated [ 462.287087] loop4: p134 start 1854537728 is beyond EOD, truncated [ 462.293418] loop4: p135 start 1854537728 is beyond EOD, truncated [ 462.299873] loop4: p136 start 1854537728 is beyond EOD, truncated [ 462.306949] loop4: p137 start 1854537728 is beyond EOD, truncated [ 462.313487] loop4: p138 start 1854537728 is beyond EOD, truncated [ 462.319743] loop4: p139 start 1854537728 is beyond EOD, truncated [ 462.327025] loop4: p140 start 1854537728 is beyond EOD, truncated [ 462.333545] loop4: p141 start 1854537728 is beyond EOD, truncated [ 462.339792] loop4: p142 start 1854537728 is beyond EOD, truncated [ 462.346116] loop4: p143 start 1854537728 is beyond EOD, truncated [ 462.354433] loop4: p144 start 1854537728 is beyond EOD, truncated [ 462.361886] loop4: p145 start 1854537728 is beyond EOD, truncated [ 462.368470] loop4: p146 start 1854537728 is beyond EOD, truncated [ 462.380584] loop4: p147 start 1854537728 is beyond EOD, truncated [ 462.386942] loop4: p148 start 1854537728 is beyond EOD, truncated [ 462.394568] loop4: p149 start 1854537728 is beyond EOD, truncated [ 462.405487] loop4: p150 start 1854537728 is beyond EOD, truncated [ 462.413040] loop4: p151 start 1854537728 is beyond EOD, truncated [ 462.419404] loop4: p152 start 1854537728 is beyond EOD, truncated [ 462.427035] loop4: p153 start 1854537728 is beyond EOD, truncated [ 462.433494] loop4: p154 start 1854537728 is beyond EOD, truncated [ 462.439804] loop4: p155 start 1854537728 is beyond EOD, truncated [ 462.450402] loop4: p156 start 1854537728 is beyond EOD, truncated [ 462.456655] loop4: p157 start 1854537728 is beyond EOD, truncated [ 462.466385] loop4: p158 start 1854537728 is beyond EOD, truncated [ 462.473455] loop4: p159 start 1854537728 is beyond EOD, truncated [ 462.479702] loop4: p160 start 1854537728 is beyond EOD, truncated [ 462.489350] loop4: p161 start 1854537728 is beyond EOD, truncated [ 462.496383] loop4: p162 start 1854537728 is beyond EOD, truncated [ 462.506098] loop4: p163 start 1854537728 is beyond EOD, truncated [ 462.513120] loop4: p164 start 1854537728 is beyond EOD, truncated [ 462.519363] loop4: p165 start 1854537728 is beyond EOD, truncated [ 462.528948] loop4: p166 start 1854537728 is beyond EOD, truncated [ 462.535400] loop4: p167 start 1854537728 is beyond EOD, truncated [ 462.541777] loop4: p168 start 1854537728 is beyond EOD, truncated [ 462.548077] loop4: p169 start 1854537728 is beyond EOD, truncated [ 462.554480] loop4: p170 start 1854537728 is beyond EOD, truncated [ 462.566723] loop4: p171 start 1854537728 is beyond EOD, truncated [ 462.573121] loop4: p172 start 1854537728 is beyond EOD, truncated [ 462.579423] loop4: p173 start 1854537728 is beyond EOD, truncated [ 462.585855] loop4: p174 start 1854537728 is beyond EOD, truncated [ 462.592340] loop4: p175 start 1854537728 is beyond EOD, truncated [ 462.598820] loop4: p176 start 1854537728 is beyond EOD, truncated [ 462.605128] loop4: p177 start 1854537728 is beyond EOD, truncated [ 462.611414] loop4: p178 start 1854537728 is beyond EOD, truncated [ 462.618169] loop4: p179 start 1854537728 is beyond EOD, truncated [ 462.624561] loop4: p180 start 1854537728 is beyond EOD, truncated [ 462.630845] loop4: p181 start 1854537728 is beyond EOD, truncated [ 462.637357] loop4: p182 start 1854537728 is beyond EOD, truncated [ 462.643658] loop4: p183 start 1854537728 is beyond EOD, truncated [ 462.649917] loop4: p184 start 1854537728 is beyond EOD, truncated [ 462.656224] loop4: p185 start 1854537728 is beyond EOD, truncated [ 462.664431] loop4: p186 start 1854537728 is beyond EOD, truncated [ 462.670736] loop4: p187 start 1854537728 is beyond EOD, truncated [ 462.676975] loop4: p188 start 1854537728 is beyond EOD, truncated [ 462.683365] loop4: p189 start 1854537728 is beyond EOD, truncated [ 462.690607] loop4: p190 start 1854537728 is beyond EOD, truncated [ 462.696847] loop4: p191 start 1854537728 is beyond EOD, truncated [ 462.703154] loop4: p192 start 1854537728 is beyond EOD, truncated [ 462.709388] loop4: p193 start 1854537728 is beyond EOD, truncated [ 462.715939] loop4: p194 start 1854537728 is beyond EOD, truncated [ 462.726548] loop4: p195 start 1854537728 is beyond EOD, truncated [ 462.732884] loop4: p196 start 1854537728 is beyond EOD, truncated [ 462.739212] loop4: p197 start 1854537728 is beyond EOD, truncated [ 462.749902] loop4: p198 start 1854537728 is beyond EOD, truncated [ 462.756365] loop4: p199 start 1854537728 is beyond EOD, truncated [ 462.766965] loop4: p200 start 1854537728 is beyond EOD, truncated [ 462.773404] loop4: p201 start 1854537728 is beyond EOD, truncated [ 462.779689] loop4: p202 start 1854537728 is beyond EOD, truncated [ 462.790414] loop4: p203 start 1854537728 is beyond EOD, truncated [ 462.796777] loop4: p204 start 1854537728 is beyond EOD, truncated [ 462.806714] loop4: p205 start 1854537728 is beyond EOD, truncated [ 462.813801] loop4: p206 start 1854537728 is beyond EOD, truncated [ 462.823459] loop4: p207 start 1854537728 is beyond EOD, truncated [ 462.843601] loop4: p208 start 1854537728 is beyond EOD, truncated [ 462.850067] loop4: p209 start 1854537728 is beyond EOD, truncated [ 462.856420] loop4: p210 start 1854537728 is beyond EOD, truncated [ 462.867215] loop4: p211 start 1854537728 is beyond EOD, truncated [ 462.873678] loop4: p212 start 1854537728 is beyond EOD, truncated [ 462.879968] loop4: p213 start 1854537728 is beyond EOD, truncated [ 462.890806] loop4: p214 start 1854537728 is beyond EOD, truncated [ 462.897234] loop4: p215 start 1854537728 is beyond EOD, truncated [ 462.907049] loop4: p216 start 1854537728 is beyond EOD, truncated [ 462.914175] loop4: p217 start 1854537728 is beyond EOD, truncated [ 462.923976] loop4: p218 start 1854537728 is beyond EOD, truncated [ 462.931301] loop4: p219 start 1854537728 is beyond EOD, truncated [ 462.937579] loop4: p220 start 1854537728 is beyond EOD, truncated [ 462.947252] loop4: p221 start 1854537728 is beyond EOD, truncated [ 462.954377] loop4: p222 start 1854537728 is beyond EOD, truncated [ 462.964085] loop4: p223 start 1854537728 is beyond EOD, truncated [ 462.971545] loop4: p224 start 1854537728 is beyond EOD, truncated [ 462.977824] loop4: p225 start 1854537728 is beyond EOD, truncated [ 462.987816] loop4: p226 start 1854537728 is beyond EOD, truncated [ 462.995108] loop4: p227 start 1854537728 is beyond EOD, truncated [ 463.004960] loop4: p228 start 1854537728 is beyond EOD, truncated [ 463.012286] loop4: p229 start 1854537728 is beyond EOD, truncated [ 463.018565] loop4: p230 start 1854537728 is beyond EOD, truncated [ 463.028281] loop4: p231 start 1854537728 is beyond EOD, truncated [ 463.038523] loop4: p232 start 1854537728 is beyond EOD, truncated [ 463.048596] loop4: p233 start 1854537728 is beyond EOD, truncated [ 463.055756] loop4: p234 start 1854537728 is beyond EOD, truncated [ 463.065574] loop4: p235 start 1854537728 is beyond EOD, truncated [ 463.072687] loop4: p236 start 1854537728 is beyond EOD, truncated [ 463.078970] loop4: p237 start 1854537728 is beyond EOD, truncated [ 463.088923] loop4: p238 start 1854537728 is beyond EOD, truncated [ 463.095984] loop4: p239 start 1854537728 is beyond EOD, truncated [ 463.105740] loop4: p240 start 1854537728 is beyond EOD, truncated [ 463.115760] loop4: p241 start 1854537728 is beyond EOD, truncated [ 463.125452] loop4: p242 start 1854537728 is beyond EOD, truncated [ 463.132382] loop4: p243 start 1854537728 is beyond EOD, truncated [ 463.138657] loop4: p244 start 1854537728 is beyond EOD, truncated [ 463.148612] loop4: p245 start 1854537728 is beyond EOD, truncated [ 463.155821] loop4: p246 start 1854537728 is beyond EOD, truncated [ 463.165498] loop4: p247 start 1854537728 is beyond EOD, truncated [ 463.172627] loop4: p248 start 1854537728 is beyond EOD, truncated [ 463.178898] loop4: p249 start 1854537728 is beyond EOD, truncated [ 463.188740] loop4: p250 start 1854537728 is beyond EOD, truncated [ 463.195858] loop4: p251 start 1854537728 is beyond EOD, truncated [ 463.205797] loop4: p252 start 1854537728 is beyond EOD, truncated [ 463.212915] loop4: p253 start 1854537728 is beyond EOD, truncated [ 463.219275] loop4: p254 start 1854537728 is beyond EOD, truncated [ 463.229477] loop4: p255 start 1854537728 is beyond EOD, truncated 13:51:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$P9_RLINK(0xffffffffffffffff, &(0x7f00000004c0)={0x7, 0x47, 0x1}, 0x7) 13:51:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) perf_event_open$cgroup(&(0x7f00000015c0)={0x1, 0x70, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000500), 0x8}, 0x4, 0x0, 0x5, 0xd, 0x1, 0x72f1eaa5, 0xb33}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x20000000000000}, 0x0) unshare(0x2040400) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, 0x0) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'netdevsim0\x00', @ifru_names='bond_slave_1\x00'}) getrusage(0x1, &(0x7f00000002c0)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000140)='syz1\x00') ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 13:51:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x202, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:19 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x65a463e7856ce035}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x14c, r5, 0x4, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffff}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x101}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc0d}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x14c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4006081) dup2(r1, r2) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x608000, 0x0) dup2(r6, r7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r7, &(0x7f0000000000)={0x40002014}) 13:51:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ccfa6e6f72655f6c6f63616c5f6637abb8d42121a23eb1ab95c30def8c2c00"]) [ 463.534094] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 463.593397] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 463.642435] gfs2: invalid mount option: Ìúnore_local_f7«¸Ô!!¢>±«•Ã ïŒ 13:51:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r3}, &(0x7f0000000180)=0x8) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) [ 463.703608] gfs2: can't parse mount arguments 13:51:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x103802) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) 13:51:20 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) bind$netrom(r0, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) creat(&(0x7f0000000180)='./bus\x00', 0x0) pipe(&(0x7f0000000000)) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0x0]) lstat(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x10, 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r7, 0x0) sendmmsg$unix(r5, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}], 0x20}], 0x1, 0x0) setresgid(r3, r4, r7) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 13:51:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:20 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x28366, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x7adf, 0x70d}, 0x10) mbind(&(0x7f0000ff3000/0xb000)=nil, 0xb000, 0x3, &(0x7f0000000000)=0x101, 0x80000000, 0x4) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 464.623200] kauditd_printk_skb: 329 callbacks suppressed [ 464.623210] audit: type=1400 audit(1576158680.684:12423): avc: denied { map } for pid=16613 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 464.818832] audit: type=1400 audit(1576158680.704:12424): avc: denied { map } for pid=16608 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 464.997962] audit: type=1400 audit(1576158680.734:12425): avc: denied { map } for pid=16613 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.110842] audit: type=1400 audit(1576158680.734:12426): avc: denied { map } for pid=16617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.201233] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 465.220949] audit: type=1400 audit(1576158680.734:12427): avc: denied { map } for pid=16617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.334564] audit: type=1400 audit(1576158680.754:12428): avc: denied { map } for pid=16617 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.431280] audit: type=1400 audit(1576158680.764:12429): avc: denied { map } for pid=16613 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.630214] audit: type=1400 audit(1576158680.764:12430): avc: denied { map } for pid=16608 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.820348] audit: type=1400 audit(1576158680.774:12431): avc: denied { map } for pid=16617 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 465.865435] audit: audit_backlog=65 > audit_backlog_limit=64 [ 466.710151] protocol 88fb is buggy, dev hsr_slave_0 [ 466.715275] protocol 88fb is buggy, dev hsr_slave_1 [ 466.960135] protocol 88fb is buggy, dev hsr_slave_0 [ 466.965318] protocol 88fb is buggy, dev hsr_slave_1 [ 467.030146] protocol 88fb is buggy, dev hsr_slave_0 [ 467.035299] protocol 88fb is buggy, dev hsr_slave_1 13:51:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$P9_RLINK(0xffffffffffffffff, &(0x7f00000004c0)={0x7, 0x47, 0x1}, 0x7) 13:51:23 executing program 0: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200697053577d314}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x18900, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0x4c7a930cd3fb231c, 0x0, 0x401}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffc1) 13:51:23 executing program 5: r0 = socket$kcm(0x10, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) socketpair(0xa, 0x4, 0x0, &(0x7f0000000080)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) write$evdev(r1, &(0x7f00000003c0)=[{{0x77359400}, 0x15, 0x8000, 0xec}, {{0x0, 0x2710}, 0x12, 0x1, 0xfffff5ed}, {{0x0, 0x2710}, 0x1f, 0x3f, 0x8001}, {{}, 0x0, 0x2, 0x1000}, {{0x0, 0x7530}, 0x14, 0x7, 0x401}, {{0x0, 0x7530}, 0x2, 0x3f, 0x6db99fcb}, {{0x0, 0x7530}, 0x12, 0x63c2, 0x3}, {{}, 0x4, 0x7f, 0x800}, {{0x77359400}, 0x3, 0x5, 0x1}], 0xd8) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ptrace(0x8, r3) dup2(r1, r2) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x210c00, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) recvmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x42) 13:51:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) prctl$PR_SET_TSC(0x1a, 0x3) r3 = accept(r1, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000080)=0x80) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000100)="3199c60ff143306f6221cee53ff15d05", 0x10) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000140)=0x1, 0x4) 13:51:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0xfffffffe, 0x4) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x5) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xc0931, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:23 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0xfffffffffffffffe}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="010035ef", @ANYRES16=r2], 0x2}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="040026bd7000ffdbdf250300000014000100ff010000000000000000000000000001080005000300000008000300ffff0000080002000900000014000100ff0101000000000000000000000000010c00040007000000ff070000"], 0x60}, 0x1, 0x0, 0x0, 0x40080}, 0x800) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0xfffffffffffffffb, 0x10102) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[]}, 0x1, 0x0, 0x0, 0x4008050}, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000004c0)) syz_open_dev$admmidi(0x0, 0x8531, 0x511800) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x280, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r5, 0x1, 0xf, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) creat(0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r6 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000001180)=[@in={0x2, 0x0, @local}], 0x10) readv(r6, &(0x7f0000000140), 0x0) 13:51:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) mq_unlink(&(0x7f0000000000)='/dev/ashmem\x00') ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000002, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) ioctl$USBDEVFS_CONNECTINFO(r6, 0x40085511, &(0x7f0000000240)) dup2(r4, r5) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r8, 0xeb26ad8eac5a8a19}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r8, 0x400, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8808}, 0x10) [ 468.507646] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1000004, 0x20010, r3, 0x1386d000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 469.175357] IPVS: ftp: loaded support on port[0] = 21 [ 469.751843] kauditd_printk_skb: 403 callbacks suppressed [ 469.751851] audit: type=1400 audit(1576158685.814:12815): avc: denied { map } for pid=16724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 469.853809] audit: type=1400 audit(1576158685.814:12816): avc: denied { map } for pid=16723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 469.969380] audit: type=1400 audit(1576158685.814:12817): avc: denied { map } for pid=16723 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.042594] audit: type=1400 audit(1576158685.814:12818): avc: denied { map } for pid=16723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.111003] audit: type=1400 audit(1576158685.814:12819): avc: denied { map } for pid=16723 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.135947] audit: type=1400 audit(1576158685.844:12820): avc: denied { map } for pid=16724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.159988] audit: type=1400 audit(1576158685.844:12821): avc: denied { map } for pid=16724 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.187552] audit: type=1400 audit(1576158685.844:12822): avc: denied { map } for pid=16724 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.212981] audit: type=1400 audit(1576158685.864:12823): avc: denied { map } for pid=16723 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 470.235686] audit: type=1400 audit(1576158685.874:12824): avc: denied { map } for pid=16724 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:51:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$P9_RLINK(0xffffffffffffffff, &(0x7f00000004c0)={0x7, 0x47, 0x1}, 0x7) 13:51:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) bind$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x19) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r1, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000006c0)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote, {[@end]}}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}, 0x0) 13:51:26 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000001f40)=0x9f, 0x4) clock_gettime(0x0, &(0x7f0000001c00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b80)=[{{&(0x7f0000000080)=@tipc, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000180)=""/167, 0xa7}, {&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f00000003c0)=""/182, 0xb6}, {&(0x7f0000000480)=""/245, 0xf5}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000240)=""/37, 0x25}, {&(0x7f0000001580)=""/175, 0xaf}, {&(0x7f0000001640)=""/69, 0x45}], 0x8, &(0x7f0000001740)=""/68, 0x44}}, {{&(0x7f00000017c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001840)=""/186, 0xba}, {&(0x7f0000001900)=""/98, 0x62}, {&(0x7f0000001980)=""/35, 0x23}, {&(0x7f00000019c0)=""/144, 0x90}], 0x4, &(0x7f0000001ac0)=""/177, 0xb1}, 0x20}], 0x2, 0x30020, &(0x7f0000001c40)={r3, r4+10000000}) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000001e40)=ANY=[@ANYBLOB="cd04c2516bc48ce2fdb3b0bbf3c02055fa891a9b3cfbd75ba5fb53b3e49b361c0d7d43c5f1036cc574623dcdd466054dab00c6145ad75777bfa798bf54bea0e9a78b081d417c169adde300000c2c99ed2c5053cb44c9caa9662c3a615284ad65ce11d946109a8b06ff547679d64fa8c325a0db90f23938320d7865c431c2ac0000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/checkreqprot\x00', 0xc000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r10, 0x84, 0x3, &(0x7f0000001dc0), &(0x7f0000001e00)=0x4) ioctl$KVM_DEASSIGN_PCI_DEVICE(r10, 0x4040ae72, &(0x7f0000001f00)={0x7f, 0xffff0001, 0x0, 0x0, 0x8}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r9}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000001c80)={r9, 0xf3f, 0x0, 0xbbf}, &(0x7f0000001cc0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000001d00)={r11, 0x3}, &(0x7f0000001d40)=0x8) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'gretap0\x00', 0xe3}) dup2(r2, r2) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) setsockopt$CAN_RAW_RECV_OWN_MSGS(r7, 0x65, 0x4, &(0x7f0000000080)=0x1, 0x4) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000000)={0x53, 0xc1, 0x4, {0x4, 0x7000}, {0x6, 0x3f}, @const={0x7, {0x9, 0xfffd, 0x7f, 0x1ff}}}) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$P9_RLINK(0xffffffffffffffff, &(0x7f00000004c0)={0x7, 0x47, 0x1}, 0x7) 13:51:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 470.617866] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 470.687654] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:26 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x1}, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000013c0)={0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec03, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:51:26 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800e000000003000000009af8889986"], 0x0, 0x14}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 13:51:26 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "85fb8ddbca4c15b8333c"}, 0xb, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x1010, r1, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 471.155628] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 471.250521] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:27 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000003c0)=""/179, 0xb3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000002c0)={0x401, 0xa3, 0x4, 0x2, 0x802, 0x4, 0x5, 0x200, 0x82c6, 0x4c, 0xcb, 0x5, 0x0, 0x24c6, &(0x7f0000000180)=""/202, 0x6, 0x400, 0x8}) 13:51:27 executing program 0: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x2, 0x2, 0x73) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x11, 0x2, 0x300) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000000c0)={"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"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00Cm\x97\x80O\xdf\x1a\x15\a\xa6\xa6\xad#\xdet\xab\xeb\x9a\xc5Qa\xa7\xcb\x18\x8d\xfa\xd6\x13Zh\xba\xce}*\xcb', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000400)=""/193) 13:51:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x2, 0x1f, 0x4, 0xfffffffffffffff8, 0x3, 0x3d, 0x4, 0x356, 0x40, 0x160, 0x1000, 0x2, 0x38, 0x2, 0x9, 0x0, 0x101}, [{0x5, 0x4b1, 0xc791, 0xcc1, 0x9, 0x9, 0xffff, 0xcfa}], "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", [[], [], [], [], [], [], []]}, 0x872) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 472.065564] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 472.210355] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 472.470128] protocol 88fb is buggy, dev hsr_slave_0 [ 472.475271] protocol 88fb is buggy, dev hsr_slave_1 13:51:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x40}, 0x1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 473.091459] device bridge_slave_1 left promiscuous mode [ 473.097036] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.310663] device bridge_slave_0 left promiscuous mode [ 473.316238] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.635067] device hsr_slave_1 left promiscuous mode [ 473.697819] device hsr_slave_0 left promiscuous mode [ 473.753934] team0 (unregistering): Port device team_slave_1 removed [ 473.792188] team0 (unregistering): Port device team_slave_0 removed [ 473.818451] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 473.907631] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 474.046757] bond0 (unregistering): Released all slaves [ 474.947797] kauditd_printk_skb: 250 callbacks suppressed [ 474.947807] audit: type=1400 audit(1576158691.004:13075): avc: denied { map } for pid=16805 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 475.040134] audit: type=1400 audit(1576158691.014:13076): avc: denied { map } for pid=16804 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 475.113464] audit: type=1400 audit(1576158691.014:13077): avc: denied { map } for pid=16804 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 475.185081] audit: type=1400 audit(1576158691.044:13078): avc: denied { map } for pid=16804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 475.270263] audit: type=1400 audit(1576158691.054:13079): avc: denied { map } for pid=16804 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 475.340125] audit: type=1400 audit(1576158691.054:13080): avc: denied { map } for pid=16805 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 475.438914] audit: type=1400 audit(1576158691.064:13081): avc: denied { map } for pid=16805 comm="syz-executor.1" path="/root/syzkaller-shm328408150" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 475.530101] audit: type=1400 audit(1576158691.064:13082): avc: denied { map } for pid=16805 comm="syz-executor.1" path="/root/syzkaller-shm835719101" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 475.638720] audit: type=1400 audit(1576158691.084:13083): avc: denied { map } for pid=16805 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 475.739025] audit: type=1400 audit(1576158691.084:13084): avc: denied { map } for pid=16804 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 477.231194] IPVS: ftp: loaded support on port[0] = 21 [ 478.059855] chnl_net:caif_netlink_parms(): no params data found [ 478.142303] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.148877] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.156037] device bridge_slave_0 entered promiscuous mode [ 478.165909] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.172415] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.179319] device bridge_slave_1 entered promiscuous mode [ 478.200700] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 478.211604] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 478.237057] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 478.245569] team0: Port device team_slave_0 added [ 478.254554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 478.261999] team0: Port device team_slave_1 added [ 478.271279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 478.280522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 478.342189] device hsr_slave_0 entered promiscuous mode [ 478.390528] device hsr_slave_1 entered promiscuous mode [ 478.434076] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 478.444447] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 478.473151] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.479651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.486326] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.492736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.582203] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 478.588358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 478.603410] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 478.618937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 478.626109] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.634439] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.647154] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 478.653466] 8021q: adding VLAN 0 to HW filter on device team0 [ 478.668316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 478.676691] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.683132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.696914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 478.704509] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.710865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.742235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 478.749875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 478.766713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 478.781746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 478.845534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 478.865806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 478.872882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 478.927140] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 478.946993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 478.957671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 478.994986] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 479.045055] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 480.369824] kauditd_printk_skb: 204 callbacks suppressed [ 480.369833] audit: type=1400 audit(1576158696.424:13289): avc: denied { map } for pid=16826 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.405443] audit: type=1400 audit(1576158696.424:13290): avc: denied { map } for pid=16826 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.427882] audit: type=1400 audit(1576158696.424:13291): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.452301] audit: type=1400 audit(1576158696.424:13292): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.476851] audit: type=1400 audit(1576158696.434:13293): avc: denied { map } for pid=16826 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.499715] audit: type=1400 audit(1576158696.434:13294): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.524437] audit: type=1400 audit(1576158696.434:13295): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.559482] audit: type=1400 audit(1576158696.434:13296): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.584087] audit: type=1400 audit(1576158696.434:13297): avc: denied { map } for pid=16826 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 480.954851] audit: type=1400 audit(1576158697.014:13298): avc: denied { map } for pid=16827 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 481.270124] protocol 88fb is buggy, dev hsr_slave_0 [ 481.275268] protocol 88fb is buggy, dev hsr_slave_1 [ 481.360271] protocol 88fb is buggy, dev hsr_slave_0 [ 481.365362] protocol 88fb is buggy, dev hsr_slave_1 [ 481.510168] protocol 88fb is buggy, dev hsr_slave_0 [ 481.515296] protocol 88fb is buggy, dev hsr_slave_1 13:51:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:51:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:38 executing program 0: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x2, 0x2, 0x73) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x11, 0x2, 0x300) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000000c0)={"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"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00Cm\x97\x80O\xdf\x1a\x15\a\xa6\xa6\xad#\xdet\xab\xeb\x9a\xc5Qa\xa7\xcb\x18\x8d\xfa\xd6\x13Zh\xba\xce}*\xcb', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000400)=""/193) 13:51:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1d9002, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0x20, 0x14, [0x81, 0x2, 0x7, 0x6, 0x0]}) 13:51:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000013001707ed12806cd20010e50bfb0d61e18fbd2fe6a5dd80009d00010801000000000300f8d708e82f87", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x2, 0xfffffffffffff002, 0x1, 0x2, 0x0, 0x8, 0x24010, 0x0, 0x0, 0x0, 0x8, 0x9, 0x0, 0x7, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x6, 0x0, 0xc9, 0x5, 0x0, 0x6, 0x4, 0x0, 0x0, 0x3, 0x2000000000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1000}) 13:51:38 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xeb, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000600), 0x4) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x4000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c25dde467726f75705f69643d8f2c1123afeed0aa5791c110b60b77342c41d6b04f2c454e4acd128ffac90b32cbfc9c2a2450cfbd27f32f2f09b13707dcce10df69004572ee5526c17af59c85d9c82771aaf10c060297dcbceffd336546604e13cc6dda221be51c8e8297d913d9de8ddb2ba63dceebffa263f648db56a1061d1ff503f160be7f4cb70eca4db10638d50875c8f7b8d01dce23bcd6ec9cb92b9ec717394672dd690e34faf24f461f75490b821d3b00e3f89ecf51490032dd56612f505990e33f0f92c5f8ef77ce37c16422f352ce70b79b64bfcac4b4", @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303366662c64656661756c745f7065726d697373696f6e732c626c6b73697a653d3078303030303030303030303030313030302c626c6b73697a653d3078303030303030303030303030303230302c66736e616d653d3a242e5b706f7369785f61636c5f6163636573732370726f63706f7369785f61636c5f616363657373707070302c6673757569643d37666300323334652d393833382d631039662d186464662d37633461343761302c00"]) r6 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x6, 0x4425c0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x7}) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(r8, 0xffffffffffffffff) r9 = dup(r8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f0000000340)={r7, 0x1c0000, r9}) [ 482.031977] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @bt={0xc3b5, 0xc73, 0xd2c, 0x3588, 0x4, 0x2, 0xc, 0x2}}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:38 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x7a2fd22060c0279, &(0x7f00000003c0)=""/253, &(0x7f00000001c0)=0xfd) r1 = socket$kcm(0x10, 0x3, 0x0) r2 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='GPL}lovmnet1\x00', 0xfffffffffffffffd) keyctl$clear(0x7, r2) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) prlimit64(r0, 0x9, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$SOUND_MIXER_INFO(r2, 0x805c4d65, &(0x7f0000000140)) sendfile(r1, r2, &(0x7f0000000040)=0x100060, 0xa808) 13:51:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:51:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000006c0)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 13:51:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x12a, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x7f, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @mcast1, 0x8}, @in6={0xa, 0x4e20, 0x200, @remote, 0x1}}}, 0x118) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 482.554957] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 482.668914] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)) socket$kcm(0xa, 0x2, 0x11) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x20}, 0x0) 13:51:38 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f00000001c0)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0xfffffe0c}], 0x169}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x20000, 0x0) iopl(0x3) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000180)={0x8001}) 13:51:39 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:39 executing program 0: creat(0x0, 0x0) io_setup(0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r1, 0x0, 0xc0000008000000b) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) 13:51:39 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='\a\x00', 0x400, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, {0x0, 0x7}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x2, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000480)={'raw\x00'}, &(0x7f00000004c0)=0x24) 13:51:39 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0xfffb}, @timestamp, @sack_perm, @mss], 0x200000000000002c) 13:51:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) getsockopt$inet_udp_int(r1, 0x11, 0xaa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f00000001c0)={0x3, &(0x7f0000000080)="15a303701bdc3f6abfaaa5c0f72136514c0dd6021b4e1575e47c8a4b289bdf8f8e0885241a504aaefdfbf71ad7e13b53fd80a35889949fc741a61d57de8c7b1c54ec651f26a27f56d2bf8d7f34def2b754c724374fa3c32266ea0352b3af3d7d6f9f9d9bda22951222b88745495ac8a1a72cf3d142261994ba236959ad5652ea0a0ed88bf783c9294884aedfb7d99feae1ed0f1d60db81fc01724f03d6e40f8d5958f010b72ae65783c021df90ebd5a0d1d77d0bcbd88be9f4de0aeebbdefa36eb86f67e0c6e4b6ed20435cee8e47d27d70c12975e164b6642f4839dd37d00daabd48c533e"}) ioctl$void(0xffffffffffffffff, 0x5451) [ 484.000881] device bridge_slave_1 left promiscuous mode [ 484.009357] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.170462] device bridge_slave_0 left promiscuous mode [ 484.176173] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:40 executing program 0 (fault-call:7 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 484.702815] device hsr_slave_1 left promiscuous mode [ 484.830351] device hsr_slave_0 left promiscuous mode [ 484.909778] team0 (unregistering): Port device team_slave_1 removed [ 484.999297] team0 (unregistering): Port device team_slave_0 removed [ 485.054346] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 485.062582] FAULT_INJECTION: forcing a failure. [ 485.062582] name failslab, interval 1, probability 0, space 0, times 0 [ 485.133655] CPU: 0 PID: 16917 Comm: syz-executor.0 Not tainted 4.14.158-syzkaller #0 [ 485.142018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.151384] Call Trace: [ 485.153977] dump_stack+0x142/0x197 [ 485.157618] should_fail.cold+0x10f/0x159 [ 485.161780] should_failslab+0xdb/0x130 [ 485.165760] kmem_cache_alloc+0x2d7/0x780 [ 485.169913] ? vcpu_enter_guest+0x2141/0x5220 [ 485.174418] mmu_topup_memory_caches+0x86/0x320 [ 485.179094] kvm_mmu_load+0x21/0xd40 [ 485.182807] ? kvm_lapic_enable_pv_eoi+0xc0/0xc0 [ 485.187563] ? vcpu_enter_guest+0x1f32/0x5220 [ 485.192060] vcpu_enter_guest+0x2eb9/0x5220 [ 485.196390] ? emulator_read_emulated+0x50/0x50 [ 485.201059] ? lock_acquire+0x16f/0x430 [ 485.205032] ? kvm_arch_vcpu_ioctl_run+0x151/0x1000 [ 485.210054] kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 485.214900] ? kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 485.219919] kvm_vcpu_ioctl+0x401/0xd10 [ 485.223907] ? kvm_vcpu_block+0xbb0/0xbb0 [ 485.228057] ? trace_hardirqs_on+0x10/0x10 [ 485.232291] ? __f_unlock_pos+0x19/0x20 [ 485.236269] ? save_trace+0x290/0x290 [ 485.240068] ? __f_unlock_pos+0x19/0x20 [ 485.244043] ? __fget+0x210/0x370 [ 485.247495] ? find_held_lock+0x35/0x130 [ 485.251554] ? __fget+0x210/0x370 [ 485.255006] ? kvm_vcpu_block+0xbb0/0xbb0 [ 485.259148] do_vfs_ioctl+0x7ae/0x1060 [ 485.263043] ? selinux_file_mprotect+0x5d0/0x5d0 [ 485.267799] ? lock_downgrade+0x740/0x740 [ 485.271952] ? ioctl_preallocate+0x1c0/0x1c0 [ 485.276360] ? __fget+0x237/0x370 [ 485.279819] ? security_file_ioctl+0x89/0xb0 [ 485.288232] SyS_ioctl+0x8f/0xc0 [ 485.291615] ? do_vfs_ioctl+0x1060/0x1060 [ 485.295777] do_syscall_64+0x1e8/0x640 [ 485.299667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.304535] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.309740] RIP: 0033:0x45a909 [ 485.312925] RSP: 002b:00007f77bbe07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.320641] RAX: ffffffffffffffda RBX: 00007f77bbe07c90 RCX: 000000000045a909 [ 485.327923] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 485.335197] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 485.342474] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77bbe086d4 [ 485.349759] R13: 00000000004c410f R14: 00000000004d9758 R15: 0000000000000007 [ 485.378256] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 485.543959] bond0 (unregistering): Released all slaves [ 485.637725] kauditd_printk_skb: 152 callbacks suppressed [ 485.637733] audit: type=1400 audit(1576158701.694:13451): avc: denied { map } for pid=16920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.740133] audit: type=1400 audit(1576158701.744:13452): avc: denied { map } for pid=16920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.820124] audit: type=1400 audit(1576158701.744:13453): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.905002] audit: type=1400 audit(1576158701.744:13454): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.929260] audit: type=1400 audit(1576158701.754:13455): avc: denied { map } for pid=16920 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.951850] audit: type=1400 audit(1576158701.764:13456): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 485.977668] audit: type=1400 audit(1576158701.764:13457): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 486.002472] audit: type=1400 audit(1576158701.764:13458): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 486.027294] audit: type=1400 audit(1576158701.764:13459): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 486.051400] audit: type=1400 audit(1576158701.794:13460): avc: denied { map } for pid=16920 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 487.460914] IPVS: ftp: loaded support on port[0] = 21 [ 488.326404] chnl_net:caif_netlink_parms(): no params data found [ 488.402161] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.408591] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.415763] device bridge_slave_0 entered promiscuous mode [ 488.424533] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.431221] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.438145] device bridge_slave_1 entered promiscuous mode [ 488.459935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 488.472350] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 488.494480] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 488.501777] team0: Port device team_slave_0 added [ 488.509440] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 488.517005] team0: Port device team_slave_1 added [ 488.525359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 488.535227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 488.593714] device hsr_slave_0 entered promiscuous mode [ 488.630519] device hsr_slave_1 entered promiscuous mode [ 488.682998] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 488.693664] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 488.726546] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.733153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.739748] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.746158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.832017] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 488.838131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 488.853181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 488.866667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 488.874774] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.884491] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.897196] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 488.904349] 8021q: adding VLAN 0 to HW filter on device team0 [ 488.917590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 488.925273] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.931683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.951128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 488.958731] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.965116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.995796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 489.003864] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 489.020496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 489.040761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 489.048197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 489.061193] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 489.067272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 489.094111] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 489.104812] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 489.112653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 489.133631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 489.310581] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 490.697653] kauditd_printk_skb: 114 callbacks suppressed [ 490.697661] audit: type=1400 audit(1576158706.754:13575): avc: denied { map } for pid=16935 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.731640] audit: type=1400 audit(1576158706.774:13576): avc: denied { map } for pid=16935 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.758019] audit: type=1400 audit(1576158706.784:13577): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.793105] audit: type=1400 audit(1576158706.784:13578): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.823050] audit: type=1400 audit(1576158706.794:13579): avc: denied { map } for pid=16935 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.846755] audit: type=1400 audit(1576158706.794:13580): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.872199] audit: type=1400 audit(1576158706.794:13581): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.896941] audit: type=1400 audit(1576158706.804:13582): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.921710] audit: type=1400 audit(1576158706.804:13583): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 490.946177] audit: type=1400 audit(1576158706.814:13584): avc: denied { map } for pid=16935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 491.190164] protocol 88fb is buggy, dev hsr_slave_0 [ 491.195277] protocol 88fb is buggy, dev hsr_slave_1 13:51:47 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x3b, 0x0, 0xffffffb5, 0x0, 0x8}, 0xae813c4b7360eaae) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = dup3(r5, r6, 0x0) dup2(r8, r7) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110000040}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x194, r9, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x77}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb746}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x58f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}]}, 0x194}}, 0x4000000) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100005}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0x1e0, r9, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7e8c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x969a}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xf8, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x721b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd4d2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff9b8d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd0c1f18}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @rand_addr="cc49e8330b761c0f9060f3156902e5a7"}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x41cef7fb3493b49d}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x41) 13:51:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) 13:51:47 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{&(0x7f0000002ec0)=@nfc_llcp, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f00000030c0)=""/207, 0xcf}], 0x2}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffa8, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r5 = open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffeb2, 0x10400003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r6, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}}}, 0x80) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r8, 0x0, &(0x7f0000000300)) open(&(0x7f0000000000)='./bus\x00', 0x1c1042, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') r10 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r11, @ANYBLOB="ff0f0600008000005d1e1f00f40009000973f5d1c7dc25c1bc56"], &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[], &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000440)={0x0, 0x8000}, 0x8) 13:51:47 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:47 executing program 0 (fault-call:7 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:47 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x2642, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000001c0)={0x9, [[0x7, 0xffffff45, 0x0, 0x1, 0x3, 0x3, 0xffff, 0x4], [0x80, 0x2, 0x100, 0x1, 0x81, 0x0, 0x6, 0x2], [0x5, 0x2, 0x4, 0x5, 0x8c, 0xffff3121, 0x7, 0xffffffc1]], [{0x7fffffff, 0x6, 0x3}, {0x4, 0x7, 0x7}, {0x8, 0x7, 0x9}, {0x7a2, 0xa1f4, 0x6}, {0x2, 0x2, 0xffffff99}, {0x5, 0x3ff, 0x9}, {0x64, 0x3f, 0x5}, {0xfffff000, 0x2, 0x10000}, {0xfb, 0x6, 0x20}, {0x6, 0x9, 0x9}, {0x1000, 0xfb4e, 0x7}, {0x3, 0x0, 0x4}], 0xaa}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f00006f8000/0x4000)=nil, &(0x7f00006fc000/0x400000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000748000/0x600000)=nil, &(0x7f00009b8000/0x4000)=nil, &(0x7f0000cb5000/0x2000)=nil, &(0x7f0000a19000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000bc0000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000c8d000/0x4000)=nil, &(0x7f0000000040), 0x0, r0}, 0x68) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)) mmap(&(0x7f00006f5000/0xd000)=nil, 0xd000, 0x0, 0x12, r0, 0xffdfe000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x10001, 0x4) [ 491.704855] FAULT_INJECTION: forcing a failure. [ 491.704855] name failslab, interval 1, probability 0, space 0, times 0 [ 491.706618] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 491.716349] CPU: 0 PID: 16948 Comm: syz-executor.0 Not tainted 4.14.158-syzkaller #0 [ 491.732760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.742137] Call Trace: [ 491.744768] dump_stack+0x142/0x197 [ 491.748409] should_fail.cold+0x10f/0x159 [ 491.752564] should_failslab+0xdb/0x130 [ 491.756545] kmem_cache_alloc+0x2d7/0x780 [ 491.760707] mmu_topup_memory_caches+0x86/0x320 [ 491.765392] kvm_mmu_load+0x21/0xd40 [ 491.769118] ? kvm_lapic_enable_pv_eoi+0xc0/0xc0 [ 491.773892] vcpu_enter_guest+0x2eb9/0x5220 [ 491.778221] ? save_trace+0x290/0x290 [ 491.782036] ? lock_downgrade+0x740/0x740 [ 491.786201] ? find_held_lock+0x100/0x130 [ 491.790361] ? emulator_read_emulated+0x50/0x50 [ 491.795052] ? lock_acquire+0x16f/0x430 [ 491.799047] ? kvm_arch_vcpu_ioctl_run+0x151/0x1000 [ 491.804079] kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 491.808923] ? kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 491.813947] kvm_vcpu_ioctl+0x401/0xd10 [ 491.813960] ? kvm_vcpu_block+0xbb0/0xbb0 [ 491.813978] ? trace_hardirqs_on+0x10/0x10 [ 491.826304] ? __f_unlock_pos+0x19/0x20 [ 491.826320] ? save_trace+0x290/0x290 [ 491.826330] ? __f_unlock_pos+0x19/0x20 [ 491.826344] ? __fget+0x210/0x370 [ 491.841888] ? find_held_lock+0x35/0x130 [ 491.845964] ? __fget+0x210/0x370 [ 491.849434] ? kvm_vcpu_block+0xbb0/0xbb0 [ 491.853705] do_vfs_ioctl+0x7ae/0x1060 [ 491.853720] ? selinux_file_mprotect+0x5d0/0x5d0 [ 491.853733] ? lock_downgrade+0x740/0x740 [ 491.853745] ? ioctl_preallocate+0x1c0/0x1c0 [ 491.853757] ? __fget+0x237/0x370 [ 491.853772] ? security_file_ioctl+0x89/0xb0 [ 491.862411] SyS_ioctl+0x8f/0xc0 [ 491.862422] ? do_vfs_ioctl+0x1060/0x1060 [ 491.862437] do_syscall_64+0x1e8/0x640 [ 491.862450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 491.895069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 491.900260] RIP: 0033:0x45a909 13:51:48 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)="08f361eb904e083dabf0ab0eae86fb7d36655e0ad0cae9700c5afb0697a6040a66940cfaffe81c10ddbbd5ae59cf954e1c96145a681d59d922149bce8206568ee35bb2eaf797343f4215b79027ad208002103ba57632a76997c63085014dd8a1556b6139fdff3f388dd7dd1ac2969c6bcac3a5925f5356b2613c6bb6b3073c42b4aa3cdeb0ad141876e5be8c3bfb714608283896754907cdadfb85c55a6c455e2eda9a", 0xa3}, {&(0x7f00000002c0)="561f2197a06fd18102fb94c9e27fcac60ea3981b8d70b8d0e12c96a8b13d650de28cfe325292b3e21cc5868ab4bb35a24580cce63f26568697b38a50fb6be40f082bde1eeebe5c81f46fb4ed645fee6cf0fd69da606ce3137d8322fb28b7a5b312db5b9c0ce45fd028337a0f228e91a9344ae7d061b00d6b4714fea41f47f9d8", 0x80}, {&(0x7f00000000c0)="368ca0674f1b7fb382e65603732f8d8c83bb1a46981cb524b1a9a0dac32459998ad37e", 0x23}, {&(0x7f00000003c0)="ad1d52a248759b574359a3c0f9f4ec7a9f0a02cbcba1c94292e403eac1ab0e2792355629515fe6ddc9d6eab10a6822a53e0621f9b03f9c132dae8f84e0db3e4d41f99df20049b8b0d24bf32e3133bd4c683c9c723c99b265be184fa54b96868112ab1dc35fc87e4eba5c0ed37e8774998dd4d0c46634f044a2591b22befd0e172e7a42c38eea2d35127b50b5c0b05e06645f8cc465c8445995c91b4f73d3364106883b9071ddc9db5114112965da6c115563c9566744966c2f03325658f6eab19e80f2ea0beb56cad6eb4dba5858900fc633300a6c293e427bb7a7c1a70c639e3dc6811318f785d17e2ec3ccf9912885fe9b595315ad", 0xf6}, {0xfffffffffffffffe}, {&(0x7f00000004c0)="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", 0xfe}, {&(0x7f00000005c0)="287b859739eb00b842829e26f0f07d6ac23194a80e3877a0fc1ee39fa2555c9f392334aec90dc30ccedbcbc7c0d395b5bfdac704685523b007755fba5d85788071d1832fcd100e98549c6809833d3fc6dfa3f6b395747ebb5625f2f20fc016c9bbb2dcdfea833ef3fc85efc15095a8fc784259f348504442e2b1b1d30000700b80", 0x81}, {&(0x7f0000000240)='\\.', 0x2}], 0x8, &(0x7f0000000700)=[{0x98, 0x10f, 0x8a9, "4a2aa3c0cdb8513563a5ad15127c4a69cbb76a2cecd1919e266c10ae088ae1abfed4bcec158e2a57369a7730622c418ca4837c9a40ee450bbc32086f806a3b77e3ac7e1172f593206e4fa01d4106918a0bc0197c4ee05e19befe90cb42d8b423154eb4836803882bb06aa14e6faaa0641e33cbc00452c5c0c6835c948ddbfa034167fdd8"}, {0x10, 0x10a, 0x20}, {0xc8, 0x10c, 0x7, "f7c932fae2fa182f350d1e467e67943dc2237904caea683ba78c46dde8215172119a5681cb266424457d237f26821d5ede048f33027fcaea8d1a6caa43c99a68d43601db7f69c1718a7a5ef2f55547177c68ac0af7b15ee1d86ceb00bfe00af27330ce4e2a9e7fd098329ef556395f4e1f8f2a7d360100abf83b3703fa9b93698bdfe24418f6f1b550e823dfb995227d4b65ed560358ede743fd081213742ddd33e65739aa4ee365e184511c7f7f3452472b4fe4bb"}, {0xf0, 0x0, 0x591, "6f0ddf48ab7ffd18c2f9d999f6afbbb27051654b464ffe84957093d80c5a4bbae3df8bc4193926fea9013b7941c16a39fc34f9404d63965013f419bac557ff38c42b7b5b30729c5a36b2c3c8d17df06c1fc84bcae5573ea3cc2ea87535ac6b673aa2928cd86064a83df57a06a37aee9731906dcbdfa6a7e4a41370a4ece09073ac9d6c7a20c70970ba0f00a069d38b08e5cbe84375904d56411ec68b0b07f2436c15601b6165563727498538607cc4f6609b5f3836d46d013b223396003ef11643c0f1b5bd57d1ea2e46c411654f1c68becdc857e9ee3a40aa7475"}, {0xb0, 0x11, 0x800, "f4d008138380ad93f3e8b36752ad990d1d56dee3c2c4c50b028d366805df7ec833c2064c38fda05a2757b977aa0015abe9ea54980005075ec33d51fd641f023c1413c0c7ca73838aade7246c2f4796d466ecee0df7ac4931eba338abdceccb750846a61588096675403f56b6861b4aefeb3b94cc81c762483244d3eb611899dba6a7545959dfd6fadb12db07b0bfa32168fa02b64089ff0e7b"}], 0x310}, 0x10) pipe(&(0x7f0000000140)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='pids.events\x00', 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r2, 0x8010550e, &(0x7f0000000380)={0xfffffff9, &(0x7f0000000a40)="55609dbe03c7c50072ab9e6c9dc0865a"}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000080)={0x9, 0x10000, 0x6, 0x1}, 0x10) [ 491.903442] RSP: 002b:00007f77bbe07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 491.911155] RAX: ffffffffffffffda RBX: 00007f77bbe07c90 RCX: 000000000045a909 [ 491.918432] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 491.925702] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 491.932972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77bbe086d4 [ 491.940246] R13: 00000000004c410f R14: 00000000004d9758 R15: 0000000000000007 13:51:48 executing program 0 (fault-call:7 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:48 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:48 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{&(0x7f0000002ec0)=@nfc_llcp, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f00000030c0)=""/207, 0xcf}], 0x2}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffa8, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) creat(&(0x7f0000000340)='./bus/file0\x00', 0x36) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r5 = open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffeb2, 0x10400003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r6 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r6, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}}}, 0x80) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r8, 0x0, &(0x7f0000000300)) open(&(0x7f0000000000)='./bus\x00', 0x1c1042, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') r10 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r11, @ANYBLOB="ff0f0600008000005d1e1f00f40009000973f5d1c7dc25c1bc56"], &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[], &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000440)={0x0, 0x8000}, 0x8) 13:51:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x4000010, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) 13:51:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) 13:51:48 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 492.584651] FAULT_INJECTION: forcing a failure. [ 492.584651] name failslab, interval 1, probability 0, space 0, times 0 13:51:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 492.815931] CPU: 0 PID: 16971 Comm: syz-executor.0 Not tainted 4.14.158-syzkaller #0 [ 492.823907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.833281] Call Trace: [ 492.835889] dump_stack+0x142/0x197 [ 492.839548] should_fail.cold+0x10f/0x159 [ 492.844193] should_failslab+0xdb/0x130 [ 492.848187] kmem_cache_alloc+0x2d7/0x780 [ 492.852363] ? __lock_acquire+0x5f7/0x4620 [ 492.856616] mmu_topup_memory_caches+0x86/0x320 [ 492.861297] kvm_mmu_load+0x21/0xd40 [ 492.865020] ? kvm_lapic_enable_pv_eoi+0xc0/0xc0 [ 492.869794] vcpu_enter_guest+0x2eb9/0x5220 [ 492.874124] ? save_trace+0x290/0x290 [ 492.877929] ? lock_downgrade+0x740/0x740 [ 492.882084] ? find_held_lock+0x100/0x130 [ 492.886245] ? emulator_read_emulated+0x50/0x50 [ 492.890922] ? lock_acquire+0x16f/0x430 [ 492.895136] ? kvm_arch_vcpu_ioctl_run+0x151/0x1000 [ 492.900254] kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 492.905106] ? kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 492.910142] kvm_vcpu_ioctl+0x401/0xd10 [ 492.914211] ? kvm_vcpu_block+0xbb0/0xbb0 [ 492.918388] ? trace_hardirqs_on+0x10/0x10 [ 492.922637] ? __f_unlock_pos+0x19/0x20 [ 492.926651] ? save_trace+0x290/0x290 [ 492.930468] ? __f_unlock_pos+0x19/0x20 [ 492.934450] ? __fget+0x210/0x370 [ 492.937914] ? find_held_lock+0x35/0x130 [ 492.941982] ? __fget+0x210/0x370 [ 492.945450] ? kvm_vcpu_block+0xbb0/0xbb0 [ 492.949606] do_vfs_ioctl+0x7ae/0x1060 [ 492.953502] ? selinux_file_mprotect+0x5d0/0x5d0 [ 492.958272] ? lock_downgrade+0x740/0x740 [ 492.962430] ? ioctl_preallocate+0x1c0/0x1c0 [ 492.966849] ? __fget+0x237/0x370 [ 492.970313] ? security_file_ioctl+0x89/0xb0 [ 492.974732] SyS_ioctl+0x8f/0xc0 [ 492.978101] ? do_vfs_ioctl+0x1060/0x1060 [ 492.982259] do_syscall_64+0x1e8/0x640 [ 492.986152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.991014] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.996466] RIP: 0033:0x45a909 [ 492.999660] RSP: 002b:00007f77bbe07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 493.007396] RAX: ffffffffffffffda RBX: 00007f77bbe07c90 RCX: 000000000045a909 13:51:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 493.014667] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 493.022030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 493.029300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77bbe086d4 [ 493.036574] R13: 00000000004c410f R14: 00000000004d9758 R15: 0000000000000007 13:51:49 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x80000, 0x7) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000002c0)={0x1, {{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}}}, 0x88) 13:51:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x300000f, 0x13, r0, 0xbf30f000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:49 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 493.811122] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 493.990145] protocol 88fb is buggy, dev hsr_slave_0 [ 493.995315] protocol 88fb is buggy, dev hsr_slave_1 13:51:50 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x4, 0x1, 0xd000, 0x2000, &(0x7f0000feb000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x101ff, 0x2, 0x0, 0x2000, &(0x7f0000fef000/0x2000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x1335c0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0xfff, 0x80, 0x7f, 0x7ff}) [ 494.420286] device bridge_slave_1 left promiscuous mode [ 494.426083] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.520625] device bridge_slave_0 left promiscuous mode [ 494.526338] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:50 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 495.028899] device hsr_slave_1 left promiscuous mode [ 495.088895] device hsr_slave_0 left promiscuous mode [ 495.189796] team0 (unregistering): Port device team_slave_1 removed [ 495.263517] team0 (unregistering): Port device team_slave_0 removed [ 495.311867] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 495.427751] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 495.512258] bond0 (unregistering): Released all slaves [ 495.572890] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 495.701576] kauditd_printk_skb: 179 callbacks suppressed [ 495.701584] audit: type=1400 audit(1576158711.764:13764): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.744895] audit: type=1400 audit(1576158711.764:13765): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.773551] audit: type=1400 audit(1576158711.764:13766): avc: denied { map } for pid=17041 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.802981] audit: type=1400 audit(1576158711.784:13767): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.830680] audit: type=1400 audit(1576158711.784:13768): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.858600] audit: type=1400 audit(1576158711.784:13769): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.886326] audit: type=1400 audit(1576158711.784:13770): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.913395] audit: type=1400 audit(1576158711.804:13771): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 495.941042] audit: type=1400 audit(1576158711.804:13772): avc: denied { map } for pid=17041 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 496.398957] audit: type=1400 audit(1576158712.454:13773): avc: denied { map } for pid=17042 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 497.321373] IPVS: ftp: loaded support on port[0] = 21 [ 498.184984] chnl_net:caif_netlink_parms(): no params data found [ 498.254149] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.260709] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.267586] device bridge_slave_0 entered promiscuous mode [ 498.276474] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.283051] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.289904] device bridge_slave_1 entered promiscuous mode [ 498.317364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 498.328625] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 498.353292] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 498.360728] team0: Port device team_slave_0 added [ 498.367968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 498.375190] team0: Port device team_slave_1 added [ 498.386105] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 498.395338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 498.452144] device hsr_slave_0 entered promiscuous mode [ 498.490342] device hsr_slave_1 entered promiscuous mode [ 498.533726] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 498.543861] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 498.578322] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.584723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.591356] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.597696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.686106] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 498.692938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 498.708419] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 498.722644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.729628] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.736721] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.750271] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 498.756505] 8021q: adding VLAN 0 to HW filter on device team0 [ 498.769382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.776974] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.783368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.802073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.809753] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.816334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.846754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 498.854717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 498.870424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 498.881482] device bridge_slave_1 left promiscuous mode [ 498.887032] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.922381] device bridge_slave_0 left promiscuous mode [ 498.927883] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.042492] device hsr_slave_1 left promiscuous mode [ 499.093997] device hsr_slave_0 left promiscuous mode [ 499.134322] team0 (unregistering): Port device team_slave_1 removed [ 499.144110] team0 (unregistering): Port device team_slave_0 removed [ 499.154775] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 499.194345] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 499.262329] bond0 (unregistering): Released all slaves [ 499.330638] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 499.337721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 499.346949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 499.353823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 499.361961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 499.379456] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 499.385831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 499.475976] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 499.494193] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 499.501386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 499.508105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 499.546746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 500.878668] kauditd_printk_skb: 92 callbacks suppressed [ 500.878678] audit: type=1400 audit(1576158716.934:13866): avc: denied { map } for pid=17054 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 500.910476] audit: type=1400 audit(1576158716.934:13867): avc: denied { map } for pid=17054 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 500.933961] audit: type=1400 audit(1576158716.944:13868): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 500.958349] audit: type=1400 audit(1576158716.944:13869): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 500.982602] audit: type=1400 audit(1576158716.944:13870): avc: denied { map } for pid=17054 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.013926] audit: type=1400 audit(1576158716.954:13871): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.042504] audit: type=1400 audit(1576158716.954:13872): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.067518] audit: type=1400 audit(1576158716.954:13873): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.092314] audit: type=1400 audit(1576158716.954:13874): avc: denied { map } for pid=17054 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.476478] audit: type=1400 audit(1576158717.534:13875): avc: denied { map } for pid=17056 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 501.910163] protocol 88fb is buggy, dev hsr_slave_0 [ 501.915283] protocol 88fb is buggy, dev hsr_slave_1 [ 502.310169] protocol 88fb is buggy, dev hsr_slave_0 [ 502.315302] protocol 88fb is buggy, dev hsr_slave_1 13:51:58 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:51:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:51:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'\x00yz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:'}, &(0x7f0000000240)='n', 0x1, r2) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:'}, &(0x7f0000000240)='n', 0x1, r3) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'\x00', 0x0}, 0x0, 0x0, r3) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:', 0x0}, &(0x7f0000000240)='n', 0x1, r1) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="cbdf4a2f91b8503d4cd462f6d7ba12a0bd64b57ee82ac4a0", 0x18, r1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) getsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f00000000c0)=""/239, &(0x7f0000000000)=0xef) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) getsockopt$inet_mreqn(r4, 0x0, 0x8a59629acf5a522e, &(0x7f00000001c0)={@multicast1, @multicast2}, &(0x7f0000000240)=0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f00000002c0), 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:58 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = msgget$private(0x0, 0x200) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000440)=""/192) msgctl$IPC_RMID(r1, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:58 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 502.486670] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:58 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 502.576373] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:51:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x800, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0x4, 0xe3, 0xfff9}) 13:51:58 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x7) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:51:59 executing program 2: mknod(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 503.231575] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 503.345380] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 503.430151] protocol 88fb is buggy, dev hsr_slave_0 [ 503.435343] protocol 88fb is buggy, dev hsr_slave_1 13:51:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfebd, 0x0, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:51:59 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80000, 0x0) userfaultfd(0x0) setsockopt$sock_int(r3, 0x1, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)=""/225) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xfffffffffffffe5e, 0x0, 0xfffffffffffffd6f}, 0x0) [ 503.670133] protocol 88fb is buggy, dev hsr_slave_0 [ 503.675283] protocol 88fb is buggy, dev hsr_slave_1 13:51:59 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = dup2(r1, r2) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r6) socket$kcm(0x2, 0x3, 0x2) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selin\x88nz\xcaheckr\x03\x00\x00\x00ot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r7, 0x28, &(0x7f0000000640)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={r9, 0x816, 0x8}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') connect$llc(r3, &(0x7f0000000240)={0x1a, 0x323, 0x0, 0x5, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) pwritev(r5, &(0x7f00000006c0)=[{&(0x7f00000002c0)="7c0038db8b2baa88ff9d1f5c2ee534df2dce2255f2ccac20cd409a132d094a9daddb60bdc8fa133dd41617eaf6553c18035d6ef8b0a796ee8202992acb74a4e9fe1ceaec94273531148a4b6a9f7d46a29e7c62baded2177cf3bd7e8407defb59483fdf75f2bbc8caf20077d55086e3e4427124388acc1f2d3590541119665ed1888bfa234308cc88da5862cea98d2509b70498cf0235a0dff7adae636b219216ac9de417e711429f7d1935b5fc2a56cf32742f057022ba54f295a1f19ad940491347cc8757d305d27727ceb67bf2855e93fcc1078d8e54ac571478b9", 0xdc}, {&(0x7f00000003c0)="0b4507698a3e0216b08fd7041816dd15988ff483ed4e9cd8e590e3e8981792f081ad7e4f46d3d5b7376a3a19966564bdebec5a517c1ab7066643227b2c54fe125b8b5ec01c7d5d00553e8f9d8f7d03eb1d5e11fcbc6343fcae3ebe6eb23d960e207ac2ffba8c1a27c457e9c5b985afff44498a2227e39132da9afaacd253fb451397cf3d271266b9da7c5fdf559550414888379d608341b1cf1ed6bfb92d90dfd7067771f321ce71ccb3b4767618edc6e2bfea62cfca14d7391770", 0xbb}, {&(0x7f0000000480)="dbb3cc5d4b7cb7abfae33084a6f2d43d0b2eaa4633b415e05f455b40304b7f6acd2c5ac5d0c49b4eb67bb7a70c92d20f65b99da82a5036675a8c97661715a0846bca", 0x42}, {&(0x7f0000000940)="c6329a35cd2533badbcb8e4128b59d7852b4f503958b3f12d38716a99def0b16dda4bf0eea2d2ec99a7ebb444090a8a98bcd1e1e61841186359834a8173b539253e1901e71378cd0c7f700251de55c4648dd71a72934991ad90445a0a9d05db427ed72d77f85532cd6f56df79cc36766396bd3145e2106240b5f4fe58c7b458165ad528d1a3178ba57dab787da72e2ba242ff4bf87871a17720d5fdfeeef23e8f4665a977e85e536c1b50e69a9e234746f219ab7bcf4ce4cdf42ebbcd7c5feaad7f6f70046ecc463dbd9c2887d5248c0065a8ac377d6ee02", 0xd8}, {&(0x7f0000000500)="396576e926a8a6d0a929385bb8069b054eb16ecce9094e686de3b048fc1eac396d374128a24e933f34e267efc8e5bf2daa75816082a7c8673b15c4d2e21e46ec2058d55281903ac538a213a574c8d0b16c79cf643a1b4ec77963ddc3d0ba3558fb8e54d87431e2a023f1d9abdf3db18bba06ab371499e170e5cac84c0589913ebb3062ecc6d086df8858b90c9e33f0e15a3939c5e0a276894abc0f693cc5ed875e794941b7ad0c418b4cc85c1fbb71c30cd0", 0xb2}], 0x5, 0x100000001) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000001e80)=0xeb0f) r12 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r12, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)=""/212, 0xd4}, 0x10000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x9a60c0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000100)={0xe8, &(0x7f00000000c0)=[{0x2, 0x5c, 0x5}, {0x0, 0x0, 0x8, 0x2}, {0x0, 0x7f, 0xa6, 0xf98c}, {0x8001, 0x3, 0x5, 0x5}, {0x7f, 0x3, 0x3, 0x10000}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000890}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="090000fe", @ANYRES16=r4, @ANYBLOB="200029bd7000ffdbdf25010000001400040009000000000000800180000091000000080002000400000008000600fd00000014000100fe8000000000000000000000000000bb"], 0x4c}, 0x1, 0x0, 0x0, 0x20000805}, 0x8000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:51:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:51:59 executing program 2: mknod(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 504.332237] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:00 executing program 2: mknod(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 504.881904] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 506.090224] device bridge_slave_1 left promiscuous mode [ 506.095874] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.150757] device bridge_slave_0 left promiscuous mode [ 506.156400] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.273264] device hsr_slave_1 left promiscuous mode [ 506.323024] device hsr_slave_0 left promiscuous mode [ 506.382600] team0 (unregistering): Port device team_slave_1 removed [ 506.392430] team0 (unregistering): Port device team_slave_0 removed [ 506.401637] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 506.454140] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 506.519595] bond0 (unregistering): Released all slaves [ 506.764492] kauditd_printk_skb: 221 callbacks suppressed [ 506.764501] audit: type=1400 audit(1576158722.824:14097): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/root/syz-executor.4" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 506.830654] audit: type=1400 audit(1576158722.824:14098): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/root/syz-executor.4" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 506.880137] audit: type=1400 audit(1576158722.834:14099): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/root/syzkaller-shm043685548" dev="sda1" ino=16495 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 506.940110] audit: type=1400 audit(1576158722.834:14100): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/root/syzkaller-shm278401563" dev="sda1" ino=16496 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 506.971068] audit: type=1400 audit(1576158722.834:14101): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 506.996931] audit: type=1400 audit(1576158722.834:14102): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 507.023865] audit: type=1400 audit(1576158722.834:14103): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 507.050397] audit: type=1400 audit(1576158722.864:14104): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 507.076383] audit: type=1400 audit(1576158722.874:14105): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 507.104099] audit: type=1400 audit(1576158722.874:14106): avc: denied { map } for pid=17142 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 508.631270] IPVS: ftp: loaded support on port[0] = 21 [ 509.403686] IPVS: ftp: loaded support on port[0] = 21 [ 509.481917] chnl_net:caif_netlink_parms(): no params data found [ 509.555023] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.561571] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.568614] device bridge_slave_0 entered promiscuous mode [ 509.578424] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.585000] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.592193] device bridge_slave_1 entered promiscuous mode [ 509.626203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 509.640183] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 509.672685] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 509.679791] team0: Port device team_slave_0 added [ 509.689269] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 509.700364] team0: Port device team_slave_1 added [ 509.709075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 509.725591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 509.782370] device hsr_slave_0 entered promiscuous mode [ 509.820394] device hsr_slave_1 entered promiscuous mode [ 509.904482] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 509.918178] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 509.975659] chnl_net:caif_netlink_parms(): no params data found [ 510.006250] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.012708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.019369] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.025790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.087296] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.094226] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.101137] device bridge_slave_0 entered promiscuous mode [ 510.116109] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.122651] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.130385] device bridge_slave_1 entered promiscuous mode [ 510.158337] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 510.170457] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 510.197448] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 510.204858] team0: Port device team_slave_0 added [ 510.214352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 510.221827] team0: Port device team_slave_1 added [ 510.230337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 510.241242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 510.303532] device hsr_slave_0 entered promiscuous mode [ 510.340437] device hsr_slave_1 entered promiscuous mode [ 510.387371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 510.397411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 510.413083] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 510.419198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.439201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 510.459395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.467165] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.476950] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.483914] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 510.494485] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 510.509690] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 510.517111] 8021q: adding VLAN 0 to HW filter on device team0 [ 510.536197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 510.543786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 510.555953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.565570] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.572006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.587096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 510.594869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 510.603384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.611402] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.617745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.635585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 510.643147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 510.662718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 510.671396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 510.689706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 510.696749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 510.706154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 510.714037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 510.732803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 510.743445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 510.751912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 510.768312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 510.776156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 510.786596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.801891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 510.808707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 510.819661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.834596] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 510.840847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 510.866671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.883561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 510.896406] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 510.911280] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 510.917546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 510.924639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 510.932747] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 510.940373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 510.947274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.964577] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 510.970732] 8021q: adding VLAN 0 to HW filter on device team0 [ 510.982844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 510.993787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 511.001007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 511.008689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 511.019517] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.025920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.040442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 511.057777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 511.066026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 511.078670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.086383] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.092794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.113577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 511.125522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 511.146880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 511.153902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 511.179404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 511.190952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 511.203497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.215138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.236335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 511.244092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 511.256792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.273049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 511.279885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 511.290510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.309695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 511.316721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 511.331580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.352567] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 511.358650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.410452] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 511.426966] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 511.433333] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 511.444203] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 511.462991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 511.979680] kauditd_printk_skb: 167 callbacks suppressed [ 511.979688] audit: type=1400 audit(1576158728.034:14274): avc: denied { map } for pid=17163 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.014313] audit: type=1400 audit(1576158728.044:14275): avc: denied { map } for pid=17163 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.036823] audit: type=1400 audit(1576158728.044:14276): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.061993] audit: type=1400 audit(1576158728.044:14277): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.087268] audit: type=1400 audit(1576158728.044:14278): avc: denied { map } for pid=17163 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.110202] audit: type=1400 audit(1576158728.054:14279): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.134959] audit: type=1400 audit(1576158728.054:14280): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.161004] audit: type=1400 audit(1576158728.064:14281): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.186317] audit: type=1400 audit(1576158728.064:14282): avc: denied { map } for pid=17163 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 512.212326] audit: type=1400 audit(1576158728.234:14283): avc: denied { map } for pid=17164 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:52:08 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0xb0002, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000140)={r6, 0x7f, 0x1, [0x3ff]}, &(0x7f0000000180)=0xa) getsockopt(r4, 0x6, 0xb, &(0x7f00000002c0)=""/205, &(0x7f00000001c0)=0xcd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0xa0000, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000140)=0x7, &(0x7f0000000180)=0x4) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) recvmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffb2}, 0x8f28a53078f314f2) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r4 = dup2(r2, r3) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x2, 0x80000000, 0x80000001}}, 0x28) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x18100, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) splice(r4, &(0x7f0000000240)=0x1, r4, &(0x7f00000002c0)=0x101, 0x3, 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) 13:52:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffc) mmap(&(0x7f0000700000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:09 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x8, 0x12, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0410ab07f6a0c65c0000000000000000"], 0x10, 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2000c0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x3) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) getpeername$netlink(r2, &(0x7f0000000200), &(0x7f0000000240)=0xc) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "a17c6187a53a254ffbbefe4c9875f966d831cb4f"}, 0x15, 0x3) 13:52:09 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x7, 'bridge_slave_0\x00', {0xfffffffb}, 0x3}) 13:52:09 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x3c7a41, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xfffffffffffffffa) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 13:52:09 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 513.830146] protocol 88fb is buggy, dev hsr_slave_0 [ 513.830184] protocol 88fb is buggy, dev hsr_slave_1 [ 513.835276] protocol 88fb is buggy, dev hsr_slave_1 [ 514.070131] protocol 88fb is buggy, dev hsr_slave_0 [ 514.075324] protocol 88fb is buggy, dev hsr_slave_1 13:52:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:10 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) getpeername$unix(r0, &(0x7f0000000080), &(0x7f0000000180)=0x6e) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000000)={0x7, 0x4}) 13:52:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x4, 0x222002) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r9 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r8, r9) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000002c0)={0x2710, 0x5, 0x1, 0x1000, &(0x7f0000fef000/0x1000)=nil}) r10 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r10, 0x1}) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r13 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r12, r13) ppoll(&(0x7f0000000340)=[{r11, 0x4}, {r13, 0x100}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={0x56}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r14 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x880200, 0x0) ioctl$KVM_SET_SREGS(r14, 0x4138ae84, &(0x7f00000000c0)={{0xd000, 0x100000, 0xb, 0x1f, 0x0, 0x9, 0x6, 0x3, 0x21, 0x0, 0x20, 0x1}, {0x6000, 0x9000, 0xb, 0x7f, 0x9, 0xfc, 0x1, 0x0, 0x80, 0x8, 0x7f, 0x7f}, {0x3000, 0x2000, 0xe, 0x80, 0x4, 0x7f, 0x43, 0x5, 0x1f, 0xfb, 0x2, 0x9}, {0x4, 0xdb65b82f210d48bb, 0xd, 0x6, 0x62, 0x80, 0x8, 0x5, 0x3f, 0x92, 0x5, 0x6}, {0x4, 0x3000, 0xc, 0x7f, 0x75, 0x0, 0x4, 0x3f, 0x3f, 0x2, 0x9, 0x72}, {0x6000, 0x2000, 0x3, 0x4, 0x0, 0x2, 0x8, 0x3f, 0xc5, 0x1, 0x3, 0x7}, {0x3000, 0x8291cfba13155a8d, 0x8, 0x78, 0x6, 0x7, 0x9, 0x20, 0x1, 0x4, 0xff, 0x1a}, {0x0, 0x6000, 0xd, 0xfd, 0x1, 0x8, 0x1, 0x81, 0x2, 0x71, 0x40, 0x80}, {0x4000}, {0xa000, 0x5000}, 0x10010, 0x0, 0x4, 0x400, 0xb, 0x0, 0x100000, [0x5, 0xfffffffffffffffc, 0x8, 0x8001]}) 13:52:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 514.483752] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0xf69c7000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$void(r0, 0xc0045878) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000040)=0x80) eventfd(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 514.709790] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:10 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xffffffffffffff96, 0x0}, 0x0) 13:52:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:11 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 515.266719] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x0, 0x4c47c86b, 0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:11 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r3, 0x7}, 0x8) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1000000, 0x1110, r4, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40000, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:52:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:11 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000006c0)={0x7, &(0x7f0000000680)="a79ee454ffc9772c298d097438e3f0baf1e95661dcf19d497767af04fe1ccc3be6c6"}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) lsetxattr$security_evm(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000780)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT]], 0x1, 0x1) r9 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0xfff, 0x20a40) mknodat(r9, &(0x7f0000000640)='./file0\x00', 0x80, 0x461cd219) dup2(r1, r2) getsockopt$inet_dccp_buf(r1, 0x21, 0xcb, &(0x7f0000000180)=""/175, &(0x7f0000000080)=0x47f) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000003c0)=""/235) 13:52:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 516.085301] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_extract_tcp_res(&(0x7f0000000100), 0x1, 0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x4) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f00000000c0)={0xfffffffd, 0xc, [0xffff8001, 0x800, 0xda]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 516.268558] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0xee00, r5) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @empty}, 0x4e24, 0x20, 0x4e20, 0x0, 0x0, 0xa0, 0x20, 0xb4, 0x0, r6}, {0x7, 0x3, 0x3, 0x3, 0x1, 0xfffffffffffffffe, 0x2, 0x4}, {0x7fffffff, 0xffffffffffffffff, 0x59e, 0x7f}, 0x1f, 0x0, 0x0, 0xc00a34ef673b316d, 0x0, 0x2}, {{@in6=@empty, 0x4d5, 0x5e}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3502, 0x3, 0x0, 0x7, 0x2, 0xb5, 0x147dda9e}}, 0xe8) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r10, 0x40106614, &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000000)="99697a6c1776b2695ab637c0200515b7", 0xffbe) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:12 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000003a40)={0xa, 0x0, 0x0, @rand_addr="43adae045ba425540566c44f7867f246"}, 0x1) sched_getscheduler(0x0) mkdir(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000400)=0x1000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000a80)={0x0, 0x0}) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r5 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 516.996844] kauditd_printk_skb: 202 callbacks suppressed [ 516.996852] audit: type=1400 audit(1576158733.054:14486): avc: denied { map } for pid=17288 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.160557] device bridge_slave_1 left promiscuous mode [ 517.166294] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.230004] audit: type=1400 audit(1576158733.094:14487): avc: denied { map } for pid=17290 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.354428] device bridge_slave_0 left promiscuous mode [ 517.361785] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.361839] audit: type=1400 audit(1576158733.114:14488): avc: denied { map } for pid=17288 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.578876] audit: type=1400 audit(1576158733.114:14489): avc: denied { map } for pid=17288 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.639627] audit: type=1400 audit(1576158733.124:14490): avc: denied { map } for pid=17290 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.734501] audit: type=1400 audit(1576158733.134:14491): avc: denied { map } for pid=17290 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.850774] device hsr_slave_1 left promiscuous mode [ 517.884055] audit: type=1400 audit(1576158733.154:14492): avc: denied { map } for pid=17288 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 517.954029] device hsr_slave_0 left promiscuous mode [ 517.957958] audit: type=1400 audit(1576158733.174:14493): avc: denied { map } for pid=17282 comm="syz-executor.3" path="/selinux/checkreqprot" dev="selinuxfs" ino=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 [ 518.021504] audit: type=1400 audit(1576158733.174:14494): avc: denied { map } for pid=17290 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 518.034073] team0 (unregistering): Port device team_slave_1 removed [ 518.073090] audit: type=1400 audit(1576158733.184:14495): avc: denied { map } for pid=17288 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 518.116049] team0 (unregistering): Port device team_slave_0 removed [ 518.151152] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 518.215867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 518.327192] bond0 (unregistering): Released all slaves [ 518.383475] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 520.271425] IPVS: ftp: loaded support on port[0] = 21 [ 521.094118] chnl_net:caif_netlink_parms(): no params data found [ 521.168150] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.174791] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.182531] device bridge_slave_0 entered promiscuous mode [ 521.191467] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.197856] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.204981] device bridge_slave_1 entered promiscuous mode [ 521.225436] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 521.236223] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 521.257170] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 521.264373] team0: Port device team_slave_0 added [ 521.271480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 521.278479] team0: Port device team_slave_1 added [ 521.285984] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 521.294898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 521.352706] device hsr_slave_0 entered promiscuous mode [ 521.400458] device hsr_slave_1 entered promiscuous mode [ 521.452514] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 521.462295] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 521.491114] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.497483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.504127] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.510521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.601443] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 521.607549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.622594] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 521.637796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 521.644871] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.653660] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.666147] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 521.672480] 8021q: adding VLAN 0 to HW filter on device team0 [ 521.687453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 521.697009] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.703427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.720665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 521.728225] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.734598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.759913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 521.772112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 521.786302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 521.810391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 521.817820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 521.829413] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 521.836003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 521.864769] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 521.875929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 521.884460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 521.905552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 522.001742] kauditd_printk_skb: 102 callbacks suppressed [ 522.001751] audit: type=1400 audit(1576158738.064:14598): avc: denied { map } for pid=17318 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.034389] audit: type=1400 audit(1576158738.064:14599): avc: denied { map } for pid=17318 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.066125] audit: type=1400 audit(1576158738.064:14600): avc: denied { map } for pid=17318 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.095546] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 522.104467] audit: type=1400 audit(1576158738.064:14601): avc: denied { map } for pid=17318 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.136776] audit: type=1400 audit(1576158738.064:14602): avc: denied { map } for pid=17318 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.162289] audit: type=1400 audit(1576158738.094:14603): avc: denied { map } for pid=17319 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.186583] audit: type=1400 audit(1576158738.094:14604): avc: denied { map } for pid=17319 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.209187] audit: type=1400 audit(1576158738.094:14605): avc: denied { map } for pid=17319 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.234372] audit: type=1400 audit(1576158738.094:14606): avc: denied { map } for pid=17319 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.259001] audit: type=1400 audit(1576158738.094:14607): avc: denied { map } for pid=17319 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 523.750115] protocol 88fb is buggy, dev hsr_slave_0 [ 523.755493] protocol 88fb is buggy, dev hsr_slave_1 [ 524.230429] protocol 88fb is buggy, dev hsr_slave_0 [ 524.235577] protocol 88fb is buggy, dev hsr_slave_1 [ 524.310256] protocol 88fb is buggy, dev hsr_slave_0 [ 524.310286] protocol 88fb is buggy, dev hsr_slave_1 13:52:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) mlockall(0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:20 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r2, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r7, 0x0, 0x1, 0x4}}, 0x20) 13:52:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="4d0000003000092fd227dc368c2f51fb0124fc0310005e9868153e370900018025643000d1bd", 0x26}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x8a73d5dbda7afc8d) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0), &(0x7f00000000c0)=0x359) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000080)=0x200, 0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000180)=0x5, 0x4) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x2a) ptrace$cont(0x18, r7, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0xa}) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) dup2(r6, r8) sendmsg$kcm(r4, &(0x7f0000000340)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3, 0x2, 0x4, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)="e42375a4c89af1f86950f2fc21f2425eb4865e21729b54c6747d1d1f2acadbb958ce787da8fa6f2d53c0538b40701b030b257f61819e0b8e5aeb2f7b270e09e07d8858c07adac012e5489383d11c65aa71be3d187989bec25c1e778510bd44a3ba7b0bc5d9cb890873d5ceb65f05521da9abee42b8a934fd18161e796d638fc0a999c627dbfda2aa800aaa3719e198e7cb8db897f95f8916443320bdb1c7a06f38ef390b8e4b", 0xfffffd32}, {&(0x7f0000000480)="c049ce59fd52a697f0fd536c82595573694260aca5b436c0d2e4a7ef321f992f14b9ef547354890cf614b096b6f813f488ae02a7b8f260e7d0c0146b576bada9078927a47ff77733cfac32f18c261f84306ac7ca9b9f1d79b5d657c31787b3b983d3588b6e195b34ba912817ccbad6e7b4f6bba97b0a9073edd1fc6a048385de9d180e6c31efa6fa85316852ae77ccad27cf39ed902b5153f4ab04414861ffdeebb41caf0301000000000000000873384b4347a52b35c2fa6613e21155160878836ec9cc35462dc7d4529bdb4bb7774ad84f0cbd30f53a3d22ba2b69bdc0aa3f244f52ea70d3ad63d2250c83", 0xfffffffffffffead}], 0x2, &(0x7f0000003040)=ANY=[@ANYBLOB="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"], 0x14f8}, 0x4000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001a80)) 13:52:20 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 13:52:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0xbb36b0f3e118f0d8, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x2000003, 0x46011, r1, 0xbbf38000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mlockall(0x1) 13:52:20 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="7365638379696f792300"/19], &(0x7f0000000180)=""/34, 0x22) 13:52:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:21 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 13:52:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r3, 0x40184152, &(0x7f0000001600)={0x0, &(0x7f0000000240)=[&(0x7f00000002c0)="483f3ffb6c3ea8a3ebeb8cfd9b98ba850124ad57a9b56ff169112cb2dad0fb3b5bd1a397de6007ed0699ffc893de893d67e48a69cfb7ae0af77a7e1ccb9b9bb14b0734fcf135b282652c3ad0c03c76d2e96da5ee1e8e42257c975b32ec16d43e428698f08919173defad1ff530f2aa23340d51c50aea0624131a37fdafe316e60f41f68375f9cfe196cb", &(0x7f0000000380)="436567dfca570b63b670a9ac415ad76824b1e090d4faa9e49d2d588946fbdc2101fed328006d1c3fd8f825dfca975b4ab0c77908c1a2ea85d1112e65d170ff62331bbed7272b31901a124be10f7e2f665b4948835fda2d1de2af25ddec56d077b22fe42eb4ce7d5a05bd320fb10cc4ea95e08639c93243457480c90751a667a0f4561deaff4cff40d729a4026430f1d42afffda180896c292c6da02a6dbbdd99b7242b8859d94bf99813aa0ba72ad21041b4bdb2d12e5ae41bc7f300892f29fd649298", &(0x7f0000000480)="0151bfc295ab76e5a5bdb337aa21c77e1afa0ac06c5bea15d85f42f510189fb8e1fc63fccdcaccf7ad6f35da650cbb0e71a1cc233bfc9a00b53fdc9aefd311fd2c3b2d5ca6086ec4e61435a9649265aaa63860cfb8e832b13bb345c731690704b1cb39e1542e83241b83f3596bdc87b0b83ee2455166e6f5811b1e9569cf8f4fdfffbed74dbf4b3d4e4eb9cb1817a6289a024f7c48cae2590016699f27fae2711456f082ab6b538a33c04c330dd8bae7ec28bab3a3eeed4fd488334de4217c9fc7f6e9b8ac2be696c8b141d56b1c6fcbc9b8", &(0x7f0000000580)="e88d1eba74d46d00b08f4ddab84b79d631749da886e7b48f3d2ea86b85de2a15a72f9a866181985c168218ad146ce8a8d447b2944a2ceedad75e2e3f40fa62ad803873803e773839cfce1f28cf69fc2a7d879cefa85b7d51e2bb37974203510266ca94", &(0x7f0000000600)="7341499725dd294fd71ab57bb6cc50da8de5f6070eee61eeb0c1d2433f84228b0792d23854c8357b854c5043659e5288830ab801f78ecbe277d1014d79540e2d178d792d4dbaa24506596b9ee3a5653205a5abc613c5d9ce9f6e19f0300092b421aae26fb28c5073f8288924bac124c84a2ffcf48b56b284490bf26630ab34be1f5b0e45d626c420df936e85489a844fac55a6c367259807181d7d9be5f8fccdffad9348a05be3cb23b57266bc8415be1df15f8abd6abc677156c38845155ab6cce3440cac037042113ac6b4f4841c4207d22649c65e229436eff97aaf5389a149d8da235d6e166a9f6511b02948ab3e75dab9583b48543d0a2798386436a7cc8606aabb07303056ad5caa919ca5cd40b6251378f10af8f043d7a4e4a4b430e272ac18c9095fae23835b38b8e8fc375936295a51524ed3f6e7e036651bc4e048989baa70e3f4f1c8af419ef9fbe88ae8932349879eee87c68003f36c532381ff22d8b6a8f24ff23575a8ddded645353b19b30f8d16ebed1f2be05b3a606d06ecf9b33700a6579094d8778f1682b49f8d2afbe3befd15080a72457a630764b81ab97ce5f5a266e37055d769bae934b2c7e51753bce2a2ab6013ed97cb66d3edb4e517d3d19f145b3e13dcaa4dbb05628ec3a49d2bf8d4be23e6ff2715887cb76927284fc510bc47db4161d58f4361945e0d6647a5ed1547eacd87f2306a9e1d183e25690633f393cd133b9b36e1eb1d5b5cc43453268c0e5a6b558c4417fe26669ccda82b260677e199171f5679efe01fbd4a0b4709495a10d10394ac382774709205f7797922b8cf206568d354c41f5d997a57e10726f842ca160c338586e2fd2addba6f65c73e5ee1357ea939a3fd0fe519dfc597543da2f747eb1c63f9d13dceebeb63564b66726b7c24c0d8b2f58af7b2b52f8e72390766dac5086b91e1b61ba4283078a05a0e63dee45e086c96bebf6442f9ba7b3583df6fc79abb7ce8d372c88606483216a4899c12528d8b9b37e4e20c5f275298a44a0542dbf8f0c481ead1e97352bdf59db7548570b00dcc63bfcdecb7eba9c45ff9bffcbb883f2e940ba1aee801d0e16b9f40eeafb5805c3b099eb02771ef5a0424d6c4e14c3ca1ea3ea1d0e15796ce2095320980c934412e39c2166f89499badd09392ceaa02902af7976e69b51fb3f975e3b3bdf4e365ea4a4c5e32c1cd5fc2f6b99dcd09fb90a66443355e11377ca69e75a7a9d853c698233d55ac795eb88135851a235e6a8670bcfee2e8254578c0fe2f00d4189b530766283c3eb229414e53a2e14085b8fa8e26a1229823803ae94804d4c0f1f57974da652cc71f0066da11564a37818a6bb896760d3548adb0aa2bbc4d9edff0b7018782569df235524285e5d773bf937795eb1ce3b3b6b7e6711cd91cc58f987eee7dcd90e7895ac767e331b78cd4692785e0a5c38e1ece191a37637ae6ef3a0714ab5f5d918bac31f459370c5482a2354253dc704f3bcd2e6de1ce237fe6aecb658edcccc8b515bab51fbc4892fd809d68568888262cd124dd0ea522d62f3e609e903f3d5b7ffd09818168131e5c12fba40fb4529126559b72fe92ef7fb82757ed6a99965ceb2092e7fb2bbabfa8feb96265cc697bb3f03f519954dc94123e8944bac745eb327f5649c493db38fc8d0be60d5ea1b5606af962b3bb763604a41693097d822abf1cc2050055375947d3f3a45195d4918f5e5e47108f0084db7f9951d1763ba5898550a7f217d8b198b02e85ec73e6ace858a8bebea9a5af25b51e6e47a04b7125efbe4c4be2e18756704e9a92a6fe0987e3692b45c78fc0f86b27e7ea229e7e0a5352f989fffd3562d70e7add3265a6c4a150ba916c8999e01eda1a245f3b98a1d472797324a91c70aa2fb537784f1f86abb37109a42cf8a0cae45d36423f73cff0311d9c0b60ab165ed26c3f3f283e2c6068a8c26f18c89fb84d0543c0dbc481805abf48c2733bbb5a11968e3a7aeef2b940271a05ac83f3e92cf2257c3bf3c44f9d0fe42c238696a36881dc2931fb0be679cb2d7851d01b617756326b916383bf2cf01c50888031954b7ad63edc94623bc2617ba8ff10ac0d6b16e1a7414def47df93cd2bb35eee62ef564fb45f60ea01464fd7f2ecf14cebb894ad29b198d62aa6fb609fea2a681f4344106a396ff160d9075120a3d27cd0e528ffbf6e1d09eebe7a8290ff104b6424bd5df857e62bbbfe7db5d79ddd261ad896fc33cf57dc16e3d59f68df492d58b3c6360713f24f88458e528fe939b5ef99ad83c760d9794e1297a2c1310161c850c402f9d15d42e90b688017f250e61d727ecb9cd1b3eb5d54c1e0cec49a6bd4faa0e1b30f1792b0ee3b8e6c425aea86c0a0725b033003ac6f60e46298a9049152837bada367c4e82cacb5070252c5f741f9c01984b0f81467fa344197ade21706870b85fdb7b91e322a830bd041a78982b5136d9ac7b5f423bd8c3567a70f6670d1e24b22f53d2e9979e8a9bfc59d77a6aa1e95a091e0404b0ae2b22be87f58d1c5f34fde1203d08c59b7d7d5eecf7eb24cc19294f98bb465d95d897aeaa6707437bdd350fd7c6736cf0a8214da90e5b5f633999de16b7c63f1958e88368e549fc509e3dfb7b084d4a17f451704fe4bc6fa67827938e10ed5917134163faa03892c5381d0e7bde279585f3282296c88af3be7a177dcb194e394677d4c5527f5984fb0314395553b18e52d6968a4b846ee1e001d4bb1eb0429615f3889b204193cf719c27a8adbb71e7805105a3874e8ee88c6ba217358f606c9b716b318b098638039e957b01061bd29694c0a36652f1c4947e64a7e3813dd7bedf7478b9cb92010f08e5b8d81f51c3dc338b95b903b59954e1e3ee745db3d7ea50c30566906f882d34f91ab77590c78823382474af7ae043084b362d12fc0a8aa405707841af9898b9d27f6344d15e0815c9927f8128656deff203f455bfb03fbbde1033d803b05aa92fa88e2b1cb3ae38180d52146e94deebb7bb6e2578035416a707f234190d665a1f26b98ba1626b1150793108f2c88ebc19fd9d67b5dfbe85e43cd8d90450d333e87a397af12986c055b736f008b94837f891fac3811b84d0cb296fc6c0d2526130f9b3931937bf149713ea19ec7bfbf799cf3d8ed4ec03a3611bb00c4adf1819718635d645e87e1aa66993623162f1d0a9c420e65239df82ee7750b5fd0fefc57fedc2e264f6be82f5131125c5a926bf4be5f3af05600a05be2bdece2bfd443f18602d07187f385a85ef54eaaffb99c58ff8ac0de5341ba19e0655e507eba892d3b6c80045a44b47a82ff9006d00df72665dceb580ba216e903a88d68e369a101f55e6eded4e4adba837f7ae32a599b4b24dac92ebcaeed0f69ff2df30bdc9dcdcd7f866eb1380d16593ffed68e5269f99a7d1ffe9473b02bffad0384c7ea5b3bbf1b400c4b677efd39d3b2438679a6d120f31ffaa0a727f53ce9c70fc59478633739a480da91fe6511b1e1c36774a89f4cf1a90fc204af07881b422bca1b418f6159d65145adf2bc607e44b0ff9493f974c9f740f9c6042eff8d8fce73c66060a0f17e264a500760d2a0bcfa7ed01c4809e9e05788aea371e2564b4e547355e57e991658695c10fa9456a6db6b858f6464dff8d73b3f0938c10f8db22b39a2f30810eb7e08bd8dc45046957b9ac6a0d3ac737f5d7f473bfc061eb9b017c19b53b3e6d20796cfdbcf4494e4e6fe3288e0e93a3aac5c7af0dd11ec857366fea82cf79b33d6a73fe27056b3f6dcf73c60502f9fae47175b78651edd5af86019f090f0cecb35de15cf4952f8bf8adba5ea7c7b04773b10462560007653ed49310ca05902a5eb358428a8ca5d2fb05db44ff419199125b61bfb6ee534f3729acc159a0ae5acbf35741ab69b98ab6fb3b6dce06837d5334c2e0c358aed0e8abe32d31a9c0b7909d965cc60a16e8d1a63f646e9804c2a90df985dbaf7cf0cc91fa5e32be3431a73d379f715b084f5130e13edf1d956876519a39222b6951b53cded1da7c8c143575e1ce96fd2f733a3e149443f3617750e1c01eb753a5ba66579961d9fafdb9acfc967768d2e197b134382b65ab3eed62807362abe8d3177a4ba41230ee3b9acc19fe2224fd25f97852d0257a8b6b87a87176158c3d5b5047596816a9cbdafa3098bccd6fa64afe32b065840556cdb27d7d8f5ffd3f2e060a3f47da7dfdbeae34c1fbd01a8df7b5a7e47e47c307b2331619a229392a7f7513b8dfa811d73a088425dc43254aee40b81c403c5af172ae34133e5a01a639f1d72590ff29cfca944209bca2b45093c3194036504f30ebc0619b0005a0849687e53afdb597d2324cd0522ddfe6e6bd892743ec744301d8d52dd7883818030f3afc02e4fa34e4aafa8cd120c60f2a0fa461ae760e69171bf013c1e624ae8fd62c6a66a41aae431b53dc05f2462be15f655243695df26889032237d6dd958e47968cf87996835f4c9463f841830be15340de22949a688eedc90e701a91be35e6011c3bed0f660b8a2368345a525a9096b309e3b375516103d0d2250c7c8dd191e5ffaeca2abf33b3ee3bda6b3c54468d6c65ed57c5d9019159640c6109b139564eec17def1174cbaef9d8a07c92ea469ed44977ed4bb1bc22e79f9ed629513208dc6c9bb594b67ee35fc256032ff3122329f917448b6da073e55467c02b2cbb5c2a7ac60f065ef6b3a83b9ed9a824667919db08ffd07297b44983211e4be3a35e4b2c4053614f15ca4d875292391d19db6262760b2f0c861fe3f5fb1e42eae0af84044dba7b839deac8daa2ebc3ec578b7d2a9cb12b2a305c461c59bcde598d22c075ca19c1c26aa304069d75828addd98d76e3758a428c7b2f60e2173be7543088dbcf47f16e4a3133ee04eb18eedb9204f30c02102d772eb05384311b5f04afd0aa3559d604f1aa0cd78ac754f6f69432a37da3fc5fe21167eaf3d1715276df7a81a0f98b4049c6d73622e95f6e722cea1cc4d497c82c46361139f93f689f4a146acae18908615f2b736b74d08e001533e2c4db0a0191a5ba37b756d721d472c61d76bf23665884bf051268690aa716db715f434081812715425e326c501cb8b4a6d58a1c43121ff6a7485373f9c7afe0103006027979f90b806df3ad9dbc374ebc7168a72cb5cb407ebf27644b271144886952ae8a40a30479dbfcf40c54d5de2d06f52f4f4ffd6168fa572b4a322097fe3c0e4adf4fbc817c891ff6b37d8c99bbc586c4d5f13449416c4309dce19a4b6f3cb6d9622d4b6e52514fd41650a2386f35b7e641e3b5ef1077e6ef315659d4064014805f9524ce8945642039705f64b93ce6d8f0282950eb03248f868683c2a4cb4681791cdaaed8df3ecdbece84f0a8ecbb34506a63c97bb65ea248d3d0e84fa120f899456f827b3a3452eaac5f10208470cf453f746361eb7c9a3ff89bd19b9ad34f3d7beec48615ad7bff6f96d7586170b70b307affb6bff11db2eff0012b94213bd965fabf947d71a5a502a41b7cc5c5bc815dd9bc62849ce7bfc0e6306600fdd6479f9b20a73feb5320a8518c0a986fb0a43de8dfa25383215b856eb0e62cd668c60399818287453bcea97d4dd7519e5e5faa9d44d40fc33c108fe0ee0fc6f5924af5d4294460ae2dea8b669e992ab83a774cf626103d143b2ba1cdcdd42060e2179d29d248cc563f7d5316ce9e2002d7ea02992a6bffc7eefd12fdd5472fc728646c588933023e0be4b70f5f91ecbcb5cbaa50c9b2c4f82ca950d377fdabfce8ab7f1bb64dacd1bea6f8a47a1da978"], 0xfe}) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400400, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000000c0)={0x401, 0x5, 0x200, 0x8, 0x8000, 0x0, 0x7, 0x1000, r5}, &(0x7f0000000100)=0x20) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:21 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 525.406267] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 525.563219] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:21 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 13:52:21 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x282200, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f00000000c0)) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1, 0x20010, r0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x5, 0x4, 0x86, 0x7f, 0x0, 0x8, 0x10000, 0xb7a765a07d73ce46, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x10}, 0x23, 0x8, 0x4, 0x0, 0x9, 0x181, 0x3510}, r1, 0xd, r2, 0xa42ed8773c657ed1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:22 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:22 executing program 0: bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x8778, @rand_addr="a4509067d1ba826aa2de2e7245a249cd", 0xffff07f4}}, 0x24) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 526.312318] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)={0x116, 0x1c, &(0x7f00000001c0)="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"}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 526.534658] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:22 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x2) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @vbi}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f00000002c0)=0x61, 0x2) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x50000, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000001740)={0xd4, 0x0, &(0x7f0000001580)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x58, 0x18, &(0x7f00000013c0)={@fd={0x66642a85, 0x0, r5}, @ptr={0x70742a85, 0x0, &(0x7f00000003c0)=""/4096, 0x1000, 0x0, 0x28}, @flat=@weak_handle={0x77682a85, 0x1}}, &(0x7f0000000340)={0x0, 0x18, 0x40}}}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x60, 0x18, &(0x7f00000014c0)={@fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000001440)=""/73, 0x49, 0x2, 0x35}, @fda={0x66646185, 0x2, 0x2, 0x1f}}, &(0x7f0000001540)={0x0, 0x18, 0x40}}, 0x60}, @clear_death, @clear_death, @increfs, @increfs_done, @decrefs={0x40046307, 0x1}], 0xb8, 0x0, &(0x7f0000001680)="766ca115c65e472c2f50672684c09493a5385f7adad7400b636fbdc43534c17bc2484fd489d1dba0f3698042ae4ffa6e212c5337389364681c170ebf508ae85e6896854085ea568253fc8a80a7e9d23daf4b8d59e4fefff5d15796604f4ad2403dd3d0f0c5761dd9bee597853cad96cc2f8f4527114d61f13e5423370f597dc653b7e2dfe15beb9d957aeb2a5b8e5c58f4dd552975d7c4dc93bf3f40c897aacbdba9ca2f75d7564f7eab7d6c101fa07e7a04154ead24a870"}) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) [ 527.045257] kauditd_printk_skb: 157 callbacks suppressed [ 527.045266] audit: type=1400 audit(1576158743.104:14765): avc: denied { map } for pid=17403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.080485] device bridge_slave_1 left promiscuous mode [ 527.086949] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.196161] audit: type=1400 audit(1576158743.154:14766): avc: denied { map } for pid=17398 comm="syz-executor.3" path="/dev/ashmem" dev="devtmpfs" ino=17227 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 527.232054] device bridge_slave_0 left promiscuous mode [ 527.237627] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.366083] audit: type=1400 audit(1576158743.164:14767): avc: denied { map } for pid=17403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.518383] audit: type=1400 audit(1576158743.164:14768): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.667121] audit: type=1400 audit(1576158743.174:14769): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.725949] device hsr_slave_1 left promiscuous mode [ 527.746683] audit: type=1400 audit(1576158743.204:14770): avc: denied { map } for pid=17403 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.782985] device hsr_slave_0 left promiscuous mode [ 527.838546] team0 (unregistering): Port device team_slave_1 removed [ 527.859318] team0 (unregistering): Port device team_slave_0 removed [ 527.868573] audit: type=1400 audit(1576158743.214:14771): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.909929] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 527.918775] audit: type=1400 audit(1576158743.224:14772): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.943607] audit: type=1400 audit(1576158743.314:14773): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 527.974084] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 527.984367] audit: type=1400 audit(1576158743.314:14774): avc: denied { map } for pid=17403 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 528.087932] bond0 (unregistering): Released all slaves [ 528.125788] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 528.143215] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 530.380970] IPVS: ftp: loaded support on port[0] = 21 [ 531.262846] chnl_net:caif_netlink_parms(): no params data found [ 531.336040] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.343072] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.349976] device bridge_slave_0 entered promiscuous mode [ 531.359544] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.366067] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.373321] device bridge_slave_1 entered promiscuous mode [ 531.395659] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 531.407325] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 531.429814] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 531.437181] team0: Port device team_slave_0 added [ 531.446297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 531.453685] team0: Port device team_slave_1 added [ 531.461200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 531.471119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 531.543700] device hsr_slave_0 entered promiscuous mode [ 531.590456] device hsr_slave_1 entered promiscuous mode [ 531.632932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 531.643208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 531.672838] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.679311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.685963] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.692375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.775278] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 531.781692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 531.796931] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 531.811227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 531.818588] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.826200] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.839310] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 531.845779] 8021q: adding VLAN 0 to HW filter on device team0 [ 531.859876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 531.869950] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.876389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.890560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 531.898242] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.904628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.932461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 531.952206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 531.959138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 531.980346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 531.987813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.999162] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 532.005285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 532.034957] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 532.046505] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 532.054776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.075376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 532.092298] kauditd_printk_skb: 64 callbacks suppressed [ 532.092306] audit: type=1400 audit(1576158748.154:14839): avc: denied { map } for pid=17419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.124217] audit: type=1400 audit(1576158748.154:14840): avc: denied { map } for pid=17419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.151083] audit: type=1400 audit(1576158748.154:14841): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.180302] audit: type=1400 audit(1576158748.154:14842): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.209230] audit: type=1400 audit(1576158748.184:14843): avc: denied { map } for pid=17419 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.238651] audit: type=1400 audit(1576158748.194:14844): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.264071] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 532.275202] audit: type=1400 audit(1576158748.194:14845): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.306097] audit: type=1400 audit(1576158748.194:14846): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.347107] audit: type=1400 audit(1576158748.194:14847): avc: denied { map } for pid=17419 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 532.377460] audit: type=1400 audit(1576158748.224:14848): avc: denied { map } for pid=17420 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 534.160132] protocol 88fb is buggy, dev hsr_slave_0 [ 534.165234] protocol 88fb is buggy, dev hsr_slave_1 [ 534.470472] protocol 88fb is buggy, dev hsr_slave_0 [ 534.475609] protocol 88fb is buggy, dev hsr_slave_1 13:52:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:30 executing program 3: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x0, 0xfffffffb, 0x3, 0x401, 0xffffff40}) 13:52:30 executing program 5: geteuid() r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f00000001c0)=0x6) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000000)) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x501) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={0xffffffffffffffff, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400), 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x9, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0x0, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x0, [], 0x0, 0x17, r5, 0x8, &(0x7f0000004380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x0, 0xd3de}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r6}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r4, 0x10, &(0x7f0000000240)={&(0x7f0000000100)=""/239, 0xef, r6}}, 0x10) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r8 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r8, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 13:52:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:30 executing program 5: r0 = socket$kcm(0x10, 0xc, 0x0) socket$bt_rfcomm(0x1f, 0x5, 0x3) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)="2e20de00000030002fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd00", 0xfffffffffffffef5}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) [ 534.675348] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 534.713750] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x68751467, 0x20000) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000040)=""/218) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:52:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:31 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2bcc2b8ad08008d51df3fa1766aecff56027822d103e858c1f5e46086027290d379c335f970c55269d45234e491ba209cf55bd3e9a329f3dcaf0f78e8fd6479a0d05a011a6a670bcc1c2284790bb120d7fd220a2ea36ee9024d311216a0b723c0e319b3dfccee85c0c46afb6982caf5c7e05a0818906c27cde9e187afc15a5b956"}], 0x0, 0x0, 0xffffffffffffff0a}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:31 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)={0x7, [0x6, 0xffff, 0x1, 0x1f, 0x80000, 0x8, 0x1]}) 13:52:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2d5, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:32 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4e004, 0x1, &(0x7f0000000140)=[{&(0x7f00000003c0)="eb3c906d6b66732e666174000204010002000270fff84c1f700f8f72f322dde25acaa5f224c9", 0x26}], 0x0, 0x0) 13:52:32 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:32 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0x5, 0xa, 0x6, 0x2, 0x0, 0x40}, 0x40}, 0xa) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000000c0)=0x10001) ioctl$TIOCCONS(r3, 0x541d) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r9 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r8, r9) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r11 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r10, r11) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() r14 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r15 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r14, r15) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000050000(user_id=', @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYRESDEC=r13, @ANYBLOB=',max_read=0x0000000000000400,default_permissions,max_read=0xfffffffffffffffb,blksize=0x0000000000001c00,max_read=0x0000000000000081,obj_role=,obj_user=em0cgroupbdev,obj_user=,appraise_type=imasig,uid<', @ANYRESDEC=r16, @ANYBLOB="b9d0"]) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r18) r19 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r19) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000140)=0xcc, 0x4) ioctl$SIOCAX25ADDUID(r8, 0x89e1, &(0x7f0000000100)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r18}) madvise(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x10) [ 536.675843] FAT-fs (loop3): Directory bread(block 16025) failed [ 536.744155] FAT-fs (loop3): Directory bread(block 16026) failed [ 536.799013] FAT-fs (loop3): Directory bread(block 16027) failed [ 536.862854] FAT-fs (loop3): Directory bread(block 16028) failed [ 536.900985] FAT-fs (loop3): Directory bread(block 16029) failed [ 536.945849] FAT-fs (loop3): Directory bread(block 16030) failed [ 537.011943] FAT-fs (loop3): Directory bread(block 16031) failed [ 537.048590] FAT-fs (loop3): Directory bread(block 16032) failed [ 537.069137] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 537.099760] FAT-fs (loop3): Directory bread(block 16033) failed [ 537.153547] FAT-fs (loop3): Directory bread(block 16034) failed [ 537.160274] kauditd_printk_skb: 167 callbacks suppressed [ 537.160281] audit: type=1400 audit(1576158753.224:15016): avc: denied { map } for pid=17506 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 537.163631] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 537.173855] audit: type=1400 audit(1576158753.224:15017): avc: denied { map } for pid=17506 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 537.220552] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 13:52:33 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 537.372805] device bridge_slave_1 left promiscuous mode [ 537.382108] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.516517] device bridge_slave_0 left promiscuous mode [ 537.527119] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.564717] audit: type=1400 audit(1576158753.284:15018): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 537.751786] audit: type=1400 audit(1576158753.294:15019): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 537.938409] audit: type=1400 audit(1576158753.324:15020): avc: denied { map } for pid=17505 comm="syz-executor.4" path="/dev/ashmem" dev="devtmpfs" ino=17227 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 538.075279] audit: type=1400 audit(1576158753.324:15021): avc: denied { map } for pid=17506 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 538.099510] device hsr_slave_1 left promiscuous mode [ 538.179341] audit: type=1400 audit(1576158753.354:15022): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 538.220786] device hsr_slave_0 left promiscuous mode [ 538.340103] audit: type=1400 audit(1576158753.354:15023): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 538.370776] team0 (unregistering): Port device team_slave_1 removed [ 538.416711] team0 (unregistering): Port device team_slave_0 removed [ 538.434608] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 538.464282] audit: type=1400 audit(1576158753.414:15024): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 538.501738] audit: type=1400 audit(1576158753.424:15025): avc: denied { map } for pid=17506 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 538.559826] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 538.665611] bond0 (unregistering): Released all slaves [ 540.290913] IPVS: ftp: loaded support on port[0] = 21 [ 541.311829] chnl_net:caif_netlink_parms(): no params data found [ 541.384835] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.391625] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.398536] device bridge_slave_0 entered promiscuous mode [ 541.408706] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.415275] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.422576] device bridge_slave_1 entered promiscuous mode [ 541.442810] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 541.453688] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 541.476533] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 541.483894] team0: Port device team_slave_0 added [ 541.491632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 541.498667] team0: Port device team_slave_1 added [ 541.506460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 541.515632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 541.572348] device hsr_slave_0 entered promiscuous mode [ 541.610400] device hsr_slave_1 entered promiscuous mode [ 541.652993] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 541.667469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 541.697702] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.704112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.710764] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.717137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.803713] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 541.809827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 541.825807] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 541.839484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 541.847464] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.854348] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.868460] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 541.874696] 8021q: adding VLAN 0 to HW filter on device team0 [ 541.891045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 541.898656] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.905059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.920402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 541.927989] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.934362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.960520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 541.981449] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 541.988473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 542.001278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.013900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 542.028923] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 542.035203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 542.063363] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 542.076613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 542.084058] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 542.104526] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 542.171131] kauditd_printk_skb: 104 callbacks suppressed [ 542.171140] audit: type=1400 audit(1576158758.234:15130): avc: denied { map } for pid=17529 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.201348] audit: type=1400 audit(1576158758.234:15131): avc: denied { map } for pid=17529 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.227271] audit: type=1400 audit(1576158758.264:15132): avc: denied { map } for pid=17530 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.249910] audit: type=1400 audit(1576158758.264:15133): avc: denied { map } for pid=17530 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.274065] audit: type=1400 audit(1576158758.264:15134): avc: denied { map } for pid=17530 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.298377] audit: type=1400 audit(1576158758.264:15135): avc: denied { map } for pid=17530 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.324103] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 542.331067] audit: type=1400 audit(1576158758.264:15136): avc: denied { map } for pid=17530 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.356688] audit: type=1400 audit(1576158758.264:15137): avc: denied { map } for pid=17530 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.382515] audit: type=1400 audit(1576158758.264:15138): avc: denied { map } for pid=17530 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 542.408955] audit: type=1400 audit(1576158758.284:15139): avc: denied { map } for pid=17530 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 544.560161] protocol 88fb is buggy, dev hsr_slave_0 [ 544.565285] protocol 88fb is buggy, dev hsr_slave_1 [ 544.570467] protocol 88fb is buggy, dev hsr_slave_0 [ 544.576176] protocol 88fb is buggy, dev hsr_slave_1 13:52:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:40 executing program 3: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0xfdffffff00000000}, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="240000005e0007031dfffd956f61050007dfc211fe000002ffffa888421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x28e}], 0x1}, 0x0) 13:52:40 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) dup2(r3, r6) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r9 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r7, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r9, 0x1}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x502421, 0x0) r10 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3e282de3, 0x0) ioctl$KVM_GET_PIT(r10, 0xc048ae65, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 13:52:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 544.773776] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 544.802295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 544.912811] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x1500) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:41 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', r4}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5e, r4}) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0, 0x0, 0x0, 0xffc5}, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) 13:52:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="aa6e041a7700fdff860609aa00630d6070266987e7467db94056a794a14f7096bf000036b564df5e0acad550fe203534da91b5b9fb0fb1d96023aafdff06b4112e46c94cb166c8d6e89f0a32942c"], 0x4e) getpid() sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:52:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:41 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:41 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 545.811063] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:42 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_tables_names\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100100000000) 13:52:42 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) 13:52:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:42 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:52:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f00000000c0)={0x101, 0xfffffff9}) prctl$PR_MCE_KILL(0x21, 0x0, 0x3) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) write$binfmt_elf64(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x856) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) setsockopt(r7, 0x401, 0x101, &(0x7f0000000100)="31261a212195bd278caf24a45117523c60a7443f391b68", 0x17) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:52:43 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_tables_names\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100100000000) 13:52:43 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:43 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) [ 547.199841] kauditd_printk_skb: 150 callbacks suppressed [ 547.199850] audit: type=1400 audit(1576158763.244:15290): avc: denied { map } for pid=17616 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 547.200562] device bridge_slave_1 left promiscuous mode [ 547.244600] audit: type=1400 audit(1576158763.304:15291): avc: denied { map } for pid=17616 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 547.402100] audit: type=1400 audit(1576158763.304:15292): avc: denied { map } for pid=17615 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 547.468771] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.642294] audit: type=1400 audit(1576158763.304:15293): avc: denied { map } for pid=17615 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 547.766465] device bridge_slave_0 left promiscuous mode [ 547.780303] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.836289] audit: type=1400 audit(1576158763.304:15294): avc: denied { map } for pid=17610 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 547.968328] audit: type=1400 audit(1576158763.304:15295): avc: denied { map } for pid=17610 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.072713] audit: type=1400 audit(1576158763.304:15296): avc: denied { map } for pid=17616 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.250109] audit: type=1400 audit(1576158763.354:15297): avc: denied { map } for pid=17616 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.310170] audit: type=1400 audit(1576158763.354:15298): avc: denied { map } for pid=17615 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.367422] device hsr_slave_1 left promiscuous mode [ 548.420487] audit: type=1400 audit(1576158763.364:15299): avc: denied { map } for pid=17615 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.478500] device hsr_slave_0 left promiscuous mode [ 548.560638] team0 (unregistering): Port device team_slave_1 removed [ 548.596628] team0 (unregistering): Port device team_slave_0 removed [ 548.614542] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 548.674700] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 548.791905] bond0 (unregistering): Released all slaves [ 550.941019] IPVS: ftp: loaded support on port[0] = 21 [ 551.872328] chnl_net:caif_netlink_parms(): no params data found [ 551.946565] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.953500] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.961195] device bridge_slave_0 entered promiscuous mode [ 551.969618] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.976266] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.983813] device bridge_slave_1 entered promiscuous mode [ 552.006046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 552.017636] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 552.040128] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 552.047247] team0: Port device team_slave_0 added [ 552.054726] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 552.061988] team0: Port device team_slave_1 added [ 552.069144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 552.078821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 552.144265] device hsr_slave_0 entered promiscuous mode [ 552.180426] device hsr_slave_1 entered promiscuous mode [ 552.232548] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 552.242446] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 552.271518] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.277898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 552.284539] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.290944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 552.373687] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 552.379900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 552.395265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 552.408497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 552.416590] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.423438] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.437113] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 552.443268] 8021q: adding VLAN 0 to HW filter on device team0 [ 552.458484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 552.466464] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.473142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 552.490189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 552.497769] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.504169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 552.532601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 552.541705] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 552.557031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 552.569866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 552.586710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 552.602848] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 552.608986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 552.636213] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 552.647009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 552.655014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 552.675325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 552.691927] kauditd_printk_skb: 78 callbacks suppressed [ 552.691934] audit: type=1400 audit(1576158768.754:15378): avc: denied { map } for pid=17642 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.722051] audit: type=1400 audit(1576158768.754:15379): avc: denied { map } for pid=17642 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.744342] audit: type=1400 audit(1576158768.754:15380): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.769875] audit: type=1400 audit(1576158768.754:15381): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.794506] audit: type=1400 audit(1576158768.784:15382): avc: denied { map } for pid=17642 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.819109] audit: type=1400 audit(1576158768.794:15383): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.844306] audit: type=1400 audit(1576158768.794:15384): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.870680] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 552.878481] audit: type=1400 audit(1576158768.794:15385): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.905066] audit: type=1400 audit(1576158768.794:15386): avc: denied { map } for pid=17642 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 552.929836] audit: type=1400 audit(1576158768.834:15387): avc: denied { map } for pid=17643 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 554.950167] protocol 88fb is buggy, dev hsr_slave_0 [ 554.955312] protocol 88fb is buggy, dev hsr_slave_1 13:52:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:'}, &(0x7f0000000240)='n', 0x1, r4) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f0000000000)='ð0cgroup\x00', &(0x7f00000000c0)) 13:52:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:51 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:51 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 13:52:51 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/ip_tables_names\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100100000000) 13:52:51 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x40000000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r3, 0x45f, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400), 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f00000003c0)={0x3, 0x9, 0x80000000, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x0, 0x0, &(0x7f0000001740)='syzkaller\x00', 0x0, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x0, [], 0x0, 0x17, r4, 0x8, &(0x7f0000004380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x0, 0xd3de}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0xfff, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xa, 0xe8, 0x200}, 0x10, r5}, 0x78) r6 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x0, 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x6, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES32=r1, @ANYBLOB="00000000800000f917160000", @ANYRES32=0x1, @ANYBLOB="00000000000000008db44000040000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x7fffffff, 0x1c4, 0x0, 0x41000, 0x1, [], 0x0, 0x13, r3, 0x8, &(0x7f0000000200)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x4, 0xc3ec, 0x80000040}, 0x10, r5, r6}, 0x78) [ 555.242764] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:51 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:52:51 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) [ 555.348962] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:51 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x30b, &(0x7f0000000380)=[{&(0x7f0000000140)="2e0000003000092fd22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x40, 0x0, 0x84df4b679bb6be5d, 0xffffffff00000000}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000000c0)={0x6, r2}) 13:52:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/66, 0x42, 0x20000040, &(0x7f0000000240)={0xa, 0x4e20, 0x3f, @rand_addr="9ad9c9923aec6321ed8d154c4dc799f5", 0x6}, 0x1c) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="39040026ad98497a23b2d0cffcbc92000000000000000900000028000300080001000100000008000303000000001400020063610000f1c9cdb6fa83f928ef19c17c26df9c3e83ed7148beda166ade8a3aa7b645a54abadc5e5f02070010c764db9aecc3cd2462b745a0602113740fa5cde306144700814b696e8393f737bba6f7c688"], 0x3c}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84200c62}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x98de}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x77, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x56, 'memory'}, {0x2d, 'pids'}, {0x5c, 'pids'}]}, 0x32) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 13:52:51 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:52:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:52:52 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 555.942081] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 556.069347] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:52 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28}, 0x28) 13:52:52 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="2e00000000000000d92780648c6394fb0124fc0010000b400c000200053580c13709159dd67efd60000180", 0x2b}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}, 0x0) 13:52:52 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:52:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x2, 0x5c76c0880699e9e3, 0x9a8bb90818a505a6, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000)=0x4, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 556.792328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=17711 comm=syz-executor.5 13:52:52 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 13:52:53 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28}, 0x28) 13:52:53 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) [ 557.280525] device bridge_slave_1 left promiscuous mode [ 557.289602] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.414936] device bridge_slave_0 left promiscuous mode [ 557.421801] bridge0: port 1(bridge_slave_0) entered disabled state 13:52:53 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 13:52:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000000)=""/14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) fcntl$setown(r3, 0x8, r5) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 557.553246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=17711 comm=syz-executor.5 13:52:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x9, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf0ffff}}, 0x14}}, 0x0) [ 557.709182] kauditd_printk_skb: 188 callbacks suppressed [ 557.709192] audit: type=1400 audit(1576158773.764:15576): avc: denied { map } for pid=17724 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:52:53 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28}, 0x28) [ 557.962669] audit: type=1400 audit(1576158773.814:15577): avc: denied { map } for pid=17724 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.103799] audit: type=1400 audit(1576158774.164:15578): avc: denied { map } for pid=17735 comm="syz-executor.4" path="/dev/ashmem" dev="devtmpfs" ino=17227 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 558.250433] device hsr_slave_1 left promiscuous mode [ 558.261738] audit: type=1400 audit(1576158774.214:15579): avc: denied { map } for pid=17736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.418018] audit: type=1400 audit(1576158774.224:15580): avc: denied { map } for pid=17736 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.455280] device hsr_slave_0 left promiscuous mode [ 558.551012] team0 (unregistering): Port device team_slave_1 removed [ 558.590379] audit: type=1400 audit(1576158774.244:15581): avc: denied { map } for pid=17736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.653157] team0 (unregistering): Port device team_slave_0 removed [ 558.758175] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 558.758182] audit: type=1400 audit(1576158774.244:15582): avc: denied { map } for pid=17736 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.758199] audit: type=1400 audit(1576158774.294:15583): avc: denied { map } for pid=17736 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 558.929780] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 559.010856] audit: type=1400 audit(1576158774.294:15584): avc: denied { map } for pid=17736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 559.110959] audit: type=1400 audit(1576158774.294:15585): avc: denied { map } for pid=17736 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 559.194821] bond0 (unregistering): Released all slaves [ 560.991174] IPVS: ftp: loaded support on port[0] = 21 [ 561.819717] chnl_net:caif_netlink_parms(): no params data found [ 561.890470] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.896894] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.904257] device bridge_slave_0 entered promiscuous mode [ 561.914696] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.921318] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.928223] device bridge_slave_1 entered promiscuous mode [ 561.949885] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 561.961998] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 561.982084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 561.989150] team0: Port device team_slave_0 added [ 561.996846] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 562.004028] team0: Port device team_slave_1 added [ 562.011811] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 562.021326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 562.083705] device hsr_slave_0 entered promiscuous mode [ 562.120357] device hsr_slave_1 entered promiscuous mode [ 562.193944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 562.202868] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 562.233599] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.239993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 562.246653] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.253042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 562.341168] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 562.347298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 562.361517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 562.375267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 562.382843] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.389592] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.404376] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 562.410641] 8021q: adding VLAN 0 to HW filter on device team0 [ 562.425790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 562.433499] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.439826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 562.460843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 562.468733] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.475218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 562.494555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 562.502524] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 562.516833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 562.535703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 562.549528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 562.565055] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 562.571278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 562.598639] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 562.610584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 562.617315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 562.640457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 562.731529] kauditd_printk_skb: 98 callbacks suppressed [ 562.731537] audit: type=1400 audit(1576158778.794:15684): avc: denied { map } for pid=17756 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.763552] audit: type=1400 audit(1576158778.794:15685): avc: denied { map } for pid=17756 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.791045] audit: type=1400 audit(1576158778.794:15686): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.819898] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 562.828076] audit: type=1400 audit(1576158778.794:15687): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.857782] audit: type=1400 audit(1576158778.794:15688): avc: denied { map } for pid=17756 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.886633] audit: type=1400 audit(1576158778.794:15689): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.916747] audit: type=1400 audit(1576158778.794:15690): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.945761] audit: type=1400 audit(1576158778.794:15691): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.975786] audit: type=1400 audit(1576158778.794:15692): avc: denied { map } for pid=17756 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 563.002583] audit: type=1400 audit(1576158778.824:15693): avc: denied { map } for pid=17757 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 564.710265] protocol 88fb is buggy, dev hsr_slave_0 [ 564.715378] protocol 88fb is buggy, dev hsr_slave_1 [ 565.030186] protocol 88fb is buggy, dev hsr_slave_0 [ 565.035364] protocol 88fb is buggy, dev hsr_slave_1 13:53:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 13:53:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)="fc25309987955292c8fc67354b298e65a976bea3b007b329cbac3e6bfd00952114f7698bc00440c8e2579fbecd25f30e546b0cc1d910d9d5ba2de278f53607043a979a1e8104a003e6028def06b41108c7e7fe393219e6727978436fc9058a4d47f0cc75cb4f26f6b3a248facaa23599bb031d55557f4f0744034f41e696ed5db3", 0x81}], 0x1, 0x4) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7, 0x341000) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000240)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x10000, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) pwritev(r7, &(0x7f00000003c0)=[{&(0x7f0000000300)="27bd645ff9c6ab87d5f037ba534dd5c21aff84f2b1774dac2b14258582ee324b3955bb4a652df88f5ae9731b3eb8767ae8bfc68b1115df8ec29685fe884bc6a9285bb0b6c34504ed2059abf9bc1f922896f67ecdd676a2203dc9c433b9f94a4055c8a1386914319d5e7baacb6f59bf478f64b72a03b2c6af578ebe7272b39f86db90958864a5dad7156611e23ce8dd90ae64eeeeef1009fe659ffc39", 0x9c}], 0x1, 0x4) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r8) fsetxattr(r8, &(0x7f0000000280)=@known='system.advise\x00', &(0x7f00000002c0)='/dev/kvm\x00', 0x9, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:53:01 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:53:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:01 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 13:53:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 13:53:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$FICLONE(r4, 0x40049409, r1) r5 = eventfd(0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) ioctl$KVM_SET_VAPIC_ADDR(r6, 0x4008ae93, &(0x7f0000000000)=0x1) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x80000000, 0x200000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 565.830163] protocol 88fb is buggy, dev hsr_slave_0 [ 565.835415] protocol 88fb is buggy, dev hsr_slave_1 13:53:02 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 13:53:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 566.070142] protocol 88fb is buggy, dev hsr_slave_0 [ 566.075346] protocol 88fb is buggy, dev hsr_slave_1 13:53:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:02 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 13:53:02 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) [ 567.110150] protocol 88fb is buggy, dev hsr_slave_0 [ 567.115303] protocol 88fb is buggy, dev hsr_slave_1 13:53:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\x00\xd1\xc1\x14c|\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b1, &(0x7f00000000c0)={'veth0\x00', @ifru_map={0x3ffc000000000000, 0x1000, 0x5, 0xde, 0x9, 0x6}}) dup2(r4, r5) fcntl$addseals(r4, 0x409, 0x8) 13:53:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:03 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x0, "94a7030000e8"}}}, 0x0) 13:53:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 567.797372] kauditd_printk_skb: 149 callbacks suppressed [ 567.797381] audit: type=1400 audit(1576158783.854:15843): avc: denied { map } for pid=17835 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:53:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 568.027980] audit: type=1400 audit(1576158783.864:15844): avc: denied { map } for pid=17836 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.054054] device bridge_slave_1 left promiscuous mode [ 568.059645] bridge0: port 2(bridge_slave_1) entered disabled state 13:53:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syncfs(r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000140)={0x3, 0x2, 0x0, 0x2000, &(0x7f0000fe9000/0x2000)=nil}) r3 = eventfd(0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x20802, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000480)=@assoc_value={0x0, 0x7ae38e96}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000500)={r6, 0x1}, 0x8) ioctl$SNDRV_PCM_IOCTL_DROP(r4, 0x4143, 0x0) mknodat(r3, &(0x7f0000000000)='./file0\x00', 0x8000, 0x40) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) ioctl$KVM_ASSIGN_DEV_IRQ(r11, 0x4040ae70, &(0x7f0000000400)={0x8, 0x6, 0xd03, 0x4}) r13 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r14 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r13, r14) io_submit(r8, 0x2, &(0x7f00000003c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x5, r1, &(0x7f00000001c0)="91b913b4b3bf49698fb7fb967db6d078062e29ee0db1c35705d3aabb5b93fdec409dd297b057ac93362fdac5da4ef332158e4bb7ee74a810e4df6428aca072ff2a202a3deabb478b97133c7658d3eed5de0e64ce866204160f8695fd33c6ba150bf2cc3b96fc3bc3121b534bb7ba41677411b0d121b45febaaf49aae970c6748ee7d51b6885c8574b19725be9f384dd64af88f49e908c93a9c04b3013ea0f80829606de71daa54c62c188ba74782d846b3d704f94868cc3acdbeeee56015e73366a31ce5cdca96657c038a8a86fc6f07008fe02f92ddc970f4100f8b5de327", 0xdf, 0x1000, 0x0, 0x0, r9}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x1000, 0xffffffffffffffff, &(0x7f0000000300)="99e8c115014767ee58e000e12c9eea7b259eec6d55b42c09eca2bce4eccb22188748f95bbb9f61f5a7a76585e7e6165ff3d3a50b6d8f97c36e43388bdafa4b02f7afb96595", 0x45, 0x100, 0x0, 0x1, r13}]) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 568.187092] audit: type=1400 audit(1576158783.864:15845): avc: denied { map } for pid=17836 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.243209] device bridge_slave_0 left promiscuous mode [ 568.248794] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.343927] audit: type=1400 audit(1576158783.864:15846): avc: denied { map } for pid=17836 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.419388] audit: type=1400 audit(1576158783.914:15847): avc: denied { map } for pid=17832 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:53:04 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x0, "94a7030000e8"}}}, 0x0) [ 568.478149] audit: type=1400 audit(1576158783.914:15848): avc: denied { map } for pid=17835 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.533804] audit: type=1400 audit(1576158783.914:15849): avc: denied { map } for pid=17835 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.799050] audit: type=1400 audit(1576158783.954:15851): avc: denied { map } for pid=17836 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.848831] device hsr_slave_1 left promiscuous mode [ 568.933601] device hsr_slave_0 left promiscuous mode [ 568.950744] audit: type=1400 audit(1576158783.954:15852): avc: denied { map } for pid=17832 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 568.986382] team0 (unregistering): Port device team_slave_1 removed [ 569.039020] team0 (unregistering): Port device team_slave_0 removed [ 569.067910] audit: type=1400 audit(1576158783.954:15853): avc: denied { map } for pid=17836 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 569.094495] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 569.220653] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 569.378830] bond0 (unregistering): Released all slaves [ 571.140931] IPVS: ftp: loaded support on port[0] = 21 [ 571.999889] chnl_net:caif_netlink_parms(): no params data found [ 572.082500] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.088951] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.096546] device bridge_slave_0 entered promiscuous mode [ 572.104940] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.111385] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.118284] device bridge_slave_1 entered promiscuous mode [ 572.139925] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 572.151360] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 572.172889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 572.180344] team0: Port device team_slave_0 added [ 572.187711] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 572.195070] team0: Port device team_slave_1 added [ 572.203037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 572.212444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 572.263090] device hsr_slave_0 entered promiscuous mode [ 572.330315] device hsr_slave_1 entered promiscuous mode [ 572.406685] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 572.416887] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 572.448384] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.454946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.461589] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.467958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.560889] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 572.567016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 572.583115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 572.596434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.604176] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.611585] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.625306] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 572.631581] 8021q: adding VLAN 0 to HW filter on device team0 [ 572.648584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.656344] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.662715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.679628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.687435] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.693808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.722450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 572.729933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 572.750526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 572.759352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.777013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.789080] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 572.795513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 572.823165] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 572.834643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 572.841901] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.862381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 572.877624] kauditd_printk_skb: 81 callbacks suppressed [ 572.877632] audit: type=1400 audit(1576158788.934:15934): avc: denied { map } for pid=17868 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 572.912711] audit: type=1400 audit(1576158788.934:15935): avc: denied { map } for pid=17868 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 572.937109] audit: type=1400 audit(1576158788.944:15936): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 572.965793] audit: type=1400 audit(1576158788.944:15937): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 572.980322] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 572.996587] audit: type=1400 audit(1576158788.944:15938): avc: denied { map } for pid=17868 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.024845] audit: type=1400 audit(1576158788.954:15939): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.053624] audit: type=1400 audit(1576158788.954:15940): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.083052] audit: type=1400 audit(1576158788.954:15941): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.108138] audit: type=1400 audit(1576158788.954:15942): avc: denied { map } for pid=17868 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.134996] audit: type=1400 audit(1576158788.984:15943): avc: denied { map } for pid=17869 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.940252] IPVS: stopping backup sync thread 7697 ... [ 573.946347] device bridge_slave_1 left promiscuous mode [ 573.953351] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.012705] device bridge_slave_0 left promiscuous mode [ 574.018266] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.082090] device bridge_slave_1 left promiscuous mode [ 574.087641] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.140727] device bridge_slave_0 left promiscuous mode [ 574.146204] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.214399] device bridge_slave_1 left promiscuous mode [ 574.225025] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.278485] device bridge_slave_0 left promiscuous mode [ 574.284930] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.413372] device hsr_slave_1 left promiscuous mode [ 574.453314] device hsr_slave_0 left promiscuous mode [ 574.493601] team0 (unregistering): Port device team_slave_1 removed [ 574.503470] team0 (unregistering): Port device team_slave_0 removed [ 574.514004] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 574.563168] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 574.644690] bond0 (unregistering): Released all slaves [ 574.802276] device hsr_slave_1 left promiscuous mode [ 574.843472] device hsr_slave_0 left promiscuous mode [ 574.883583] team0 (unregistering): Port device team_slave_1 removed [ 574.893614] team0 (unregistering): Port device team_slave_0 removed [ 574.904778] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 574.943980] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 575.025668] bond0 (unregistering): Released all slaves [ 575.113978] device hsr_slave_1 left promiscuous mode [ 575.174673] device hsr_slave_0 left promiscuous mode [ 575.213764] team0 (unregistering): Port device team_slave_1 removed [ 575.223582] team0 (unregistering): Port device team_slave_0 removed [ 575.233840] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 575.274589] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 575.361165] bond0 (unregistering): Released all slaves 13:53:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a000007000000000020000000854105001a0000000010206509a3ed1317d895c9ff06ffffffeb00000024426e38297f5a9adc53ab0037"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x3ef, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40, 0x0) mmap$perf(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x2, 0xa010, r5, 0x4162) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:11 executing program 3: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x0, "94a7030000e8"}}}, 0x0) 13:53:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:11 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863}}}, 0x0) 13:53:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:11 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863}}}, 0x0) 13:53:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:12 executing program 3: syz_emit_ethernet(0xe, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863}}}, 0x0) 13:53:12 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a703"}}}, 0x0) 13:53:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0xffffffffffff2246) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:12 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a703"}}}, 0x0) [ 577.924139] kauditd_printk_skb: 128 callbacks suppressed [ 577.924150] audit: type=1400 audit(1576158793.984:16072): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/root/syz-executor.5" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 577.980927] audit: type=1400 audit(1576158794.004:16073): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/root/syz-executor.5" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 578.038733] audit: type=1400 audit(1576158794.024:16074): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/root/syzkaller-shm253188798" dev="sda1" ino=16497 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 578.065453] audit: type=1400 audit(1576158794.024:16075): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/root/syzkaller-shm561443077" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 578.093932] audit: type=1400 audit(1576158794.034:16076): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 578.121885] audit: type=1400 audit(1576158794.044:16077): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 578.147756] audit: type=1400 audit(1576158794.054:16078): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 578.175155] audit: type=1400 audit(1576158794.054:16079): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 578.203746] audit: type=1400 audit(1576158794.064:16080): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 578.230263] audit: type=1400 audit(1576158794.074:16081): avc: denied { map } for pid=17913 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 580.410958] IPVS: ftp: loaded support on port[0] = 21 [ 581.353925] IPVS: ftp: loaded support on port[0] = 21 [ 581.428136] chnl_net:caif_netlink_parms(): no params data found [ 581.547940] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.554699] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.562502] device bridge_slave_0 entered promiscuous mode [ 581.562658] IPVS: ftp: loaded support on port[0] = 21 [ 581.577521] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.583966] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.591231] device bridge_slave_1 entered promiscuous mode [ 581.649454] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 581.665929] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 581.683325] chnl_net:caif_netlink_parms(): no params data found [ 581.716932] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 581.725344] team0: Port device team_slave_0 added [ 581.736480] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 581.743715] team0: Port device team_slave_1 added [ 581.753136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 581.777938] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 581.852308] IPVS: ftp: loaded support on port[0] = 21 [ 581.892354] device hsr_slave_0 entered promiscuous mode [ 581.930356] device hsr_slave_1 entered promiscuous mode [ 582.012314] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 582.019072] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.025815] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.033229] device bridge_slave_0 entered promiscuous mode [ 582.047401] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 582.065658] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.073548] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.082842] device bridge_slave_1 entered promiscuous mode [ 582.148233] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 582.179408] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 582.234284] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.240701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.247323] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.253670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.263629] chnl_net:caif_netlink_parms(): no params data found [ 582.287286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 582.294748] team0: Port device team_slave_0 added [ 582.331147] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 582.339923] team0: Port device team_slave_1 added [ 582.409166] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 582.428000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 582.488394] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.498446] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.512527] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.518894] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.526517] device bridge_slave_0 entered promiscuous mode [ 582.583679] device hsr_slave_0 entered promiscuous mode [ 582.630493] device hsr_slave_1 entered promiscuous mode [ 582.676146] chnl_net:caif_netlink_parms(): no params data found [ 582.685772] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.692227] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.699239] device bridge_slave_1 entered promiscuous mode [ 582.706302] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 582.732730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 582.775783] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 582.825985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 582.861916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 582.869115] team0: Port device team_slave_0 added [ 582.878012] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 582.885220] team0: Port device team_slave_1 added [ 582.914913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 582.933675] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.940870] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.947945] device bridge_slave_0 entered promiscuous mode [ 582.955426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 582.964610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 582.977398] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.983955] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.991125] device bridge_slave_1 entered promiscuous mode [ 583.045801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 583.092397] device hsr_slave_0 entered promiscuous mode [ 583.150435] device hsr_slave_1 entered promiscuous mode [ 583.204459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 583.218787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 583.231326] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 583.239969] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 583.254076] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 583.297951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 583.305233] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 583.316396] team0: Port device team_slave_0 added [ 583.326623] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 583.335283] team0: Port device team_slave_1 added [ 583.342796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 583.349681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 583.369102] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 583.375507] 8021q: adding VLAN 0 to HW filter on device team0 [ 583.384091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 583.408020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 583.417386] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 583.434836] device bridge_slave_1 left promiscuous mode [ 583.443042] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.470869] device bridge_slave_0 left promiscuous mode [ 583.476371] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.594681] device hsr_slave_1 left promiscuous mode [ 583.632674] device hsr_slave_0 left promiscuous mode [ 583.672864] team0 (unregistering): Port device team_slave_1 removed [ 583.682946] team0 (unregistering): Port device team_slave_0 removed [ 583.692644] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 583.744855] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 583.804267] bond0 (unregistering): Released all slaves [ 583.857733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 583.869743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 583.877733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 583.886297] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.892721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.942763] device hsr_slave_0 entered promiscuous mode [ 583.980445] device hsr_slave_1 entered promiscuous mode [ 584.027912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 584.051221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 584.059108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.067056] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.073545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.081163] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 584.091448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 584.100187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 584.110678] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 584.144157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 584.155646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 584.215962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 584.245673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 584.255386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 584.283507] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 584.296326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 584.303608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 584.320913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 584.328856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 584.347280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.365876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 584.385744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 584.397859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.411106] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 584.438324] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 584.450593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 584.458215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.486998] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 584.508331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 584.515586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.546031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 584.555037] 8021q: adding VLAN 0 to HW filter on device team0 [ 584.565595] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 584.571914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 584.635233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.643778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 584.673070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 584.686755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.696039] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.702476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.718726] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 584.727439] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 584.741698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 584.765017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 584.779716] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 584.799061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 584.817173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.826503] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.832903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.845810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 584.852594] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 584.865018] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 584.886091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 584.915566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 584.925378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.941300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 584.957386] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 584.969670] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.007718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 585.018511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 585.035187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 585.058096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 585.073935] kauditd_printk_skb: 110 callbacks suppressed [ 585.073945] audit: type=1400 audit(1576158801.134:16192): avc: denied { map } for pid=17929 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.111588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 585.120639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.136349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 585.154822] audit: type=1400 audit(1576158801.134:16193): avc: denied { map } for pid=17929 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.160678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 585.200766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 585.208647] audit: type=1400 audit(1576158801.134:16194): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.208737] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.239364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.270649] audit: type=1400 audit(1576158801.134:16195): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.306857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 585.314494] audit: type=1400 audit(1576158801.154:16196): avc: denied { map } for pid=17929 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.318879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 585.337419] audit: type=1400 audit(1576158801.164:16197): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.337443] audit: type=1400 audit(1576158801.164:16198): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.337458] audit: type=1400 audit(1576158801.164:16199): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.337473] audit: type=1400 audit(1576158801.164:16200): avc: denied { map } for pid=17929 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.337490] audit: type=1400 audit(1576158801.314:16201): avc: denied { map } for pid=17930 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 585.468580] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.474985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.481920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 585.490592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 585.502829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 585.522494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 585.536242] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 585.542855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 585.550107] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 585.557169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 585.568268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 585.576557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 585.597652] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 585.615504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 585.624569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 585.636679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.644614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 585.655763] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 585.671460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 585.678976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 585.694853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 585.704602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 585.715209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 585.727216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 585.749486] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 585.755888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 585.766301] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 585.776442] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.784026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 585.795007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 585.803933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 585.815700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 585.838324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 585.854055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 585.865418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 585.875209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 585.883764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 585.893177] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.899551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.927604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 585.950843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 585.957944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 585.980539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.998084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 586.025126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 586.036018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 586.050824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.058325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 586.067481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 586.075346] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.081852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.092433] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 586.103523] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 586.109646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 586.128042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 586.138570] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 586.150666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 586.168872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 586.177409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 586.208160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.219010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 586.245543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 586.262284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 586.269609] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 586.278194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 586.290530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 586.319467] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 586.328224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 586.350621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 586.357758] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 586.380618] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 586.387384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 586.410668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 586.447601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 586.458593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 586.472422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 586.489590] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.511647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 586.518576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 586.529391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.556128] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 586.567069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 586.689666] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 586.744886] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 586.770600] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 586.777364] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 586.857271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 587.590237] net_ratelimit: 4 callbacks suppressed [ 587.590243] protocol 88fb is buggy, dev hsr_slave_0 [ 587.600260] protocol 88fb is buggy, dev hsr_slave_1 13:53:23 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x3c7a41, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xfffffffffffffffa) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 13:53:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 588.630148] protocol 88fb is buggy, dev hsr_slave_0 [ 588.635328] protocol 88fb is buggy, dev hsr_slave_1 [ 588.710138] protocol 88fb is buggy, dev hsr_slave_0 [ 588.715296] protocol 88fb is buggy, dev hsr_slave_1 [ 589.030133] protocol 88fb is buggy, dev hsr_slave_0 [ 589.035317] protocol 88fb is buggy, dev hsr_slave_1 [ 589.110180] protocol 88fb is buggy, dev hsr_slave_0 [ 589.115327] protocol 88fb is buggy, dev hsr_slave_1 [ 589.220593] device bridge_slave_1 left promiscuous mode [ 589.230143] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.271465] device bridge_slave_0 left promiscuous mode [ 589.277220] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.392296] device hsr_slave_1 left promiscuous mode [ 589.454595] device hsr_slave_0 left promiscuous mode [ 589.503539] team0 (unregistering): Port device team_slave_1 removed [ 589.514903] team0 (unregistering): Port device team_slave_0 removed [ 589.524535] bond0 (unregistering): Releasing backup interface bond_slave_1 13:53:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_netfilter(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="14000000004001001a00"/20], 0x14}}, 0x0) [ 589.583645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 589.684878] bond0 (unregistering): Released all slaves 13:53:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:25 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a703"}}}, 0x0) 13:53:25 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x3c7a41, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xfffffffffffffffa) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 13:53:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\x00\x02\xfd\x00u\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) eventfd(0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2f2c8126, 0x500) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:25 executing program 2: 13:53:26 executing program 3: syz_emit_ethernet(0x13, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000"}}}, 0x0) 13:53:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1d, 0x800, 0x9, 0x3, 0x302, r3, 0x9, [], 0x0, r5, 0x3, 0x4}, 0x3c) r7 = eventfd(0x50) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$USBDEVFS_GET_SPEED(r8, 0x551f) 13:53:26 executing program 2: [ 590.189961] kauditd_printk_skb: 333 callbacks suppressed [ 590.189969] audit: type=1400 audit(1576158806.244:16535): avc: denied { map } for pid=18000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:53:26 executing program 4: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) socket(0x0, 0x0, 0x3) socket(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x1000, 0x0, 0x5, 0xfffffffffffffffb, 0xffff}) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x80000) setsockopt$inet_group_source_req(r2, 0x0, 0x2b, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x108) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) [ 590.301873] audit: type=1400 audit(1576158806.294:16536): avc: denied { map } for pid=18000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:53:26 executing program 3: syz_emit_ethernet(0x13, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000"}}}, 0x0) [ 590.452935] audit: type=1400 audit(1576158806.314:16537): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:53:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = dup2(0xffffffffffffffff, r5) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x408c5333, &(0x7f00000000c0)={0x400, 0x4, 0x1, 'queue1\x00', 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 590.640852] audit: type=1400 audit(1576158806.314:16538): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 590.720110] audit: type=1400 audit(1576158806.324:16539): avc: denied { map } for pid=18000 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 590.794195] audit: type=1400 audit(1576158806.334:16540): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 590.927377] audit: type=1400 audit(1576158806.354:16541): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 591.006755] audit: type=1400 audit(1576158806.394:16542): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 591.102355] audit: type=1400 audit(1576158806.404:16543): avc: denied { map } for pid=18000 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 591.193811] audit: type=1400 audit(1576158806.404:16544): avc: denied { map } for pid=18003 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 593.041399] IPVS: ftp: loaded support on port[0] = 21 [ 593.833466] chnl_net:caif_netlink_parms(): no params data found [ 593.916590] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.923600] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.931583] device bridge_slave_0 entered promiscuous mode [ 593.940868] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.947296] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.954387] device bridge_slave_1 entered promiscuous mode [ 593.975348] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 593.986420] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 594.009376] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 594.016739] team0: Port device team_slave_0 added [ 594.024140] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 594.031353] team0: Port device team_slave_1 added [ 594.039200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 594.048730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 594.112166] device hsr_slave_0 entered promiscuous mode [ 594.150419] device hsr_slave_1 entered promiscuous mode [ 594.196234] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 594.206448] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 594.240483] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.246949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 594.253857] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.260237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 594.349156] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 594.355832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 594.369313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 594.386475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 594.394232] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.401608] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.416308] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 594.422981] 8021q: adding VLAN 0 to HW filter on device team0 [ 594.440981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 594.448575] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.454965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 594.470510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 594.478120] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.484502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 594.517179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 594.525738] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 594.550441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 594.559917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 594.575657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 594.589045] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 594.597244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 594.625703] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 594.637162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 594.644300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 594.667159] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 594.810647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 595.418836] kauditd_printk_skb: 190 callbacks suppressed [ 595.418844] audit: type=1400 audit(1576158811.474:16735): avc: denied { map } for pid=18037 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.452130] audit: type=1400 audit(1576158811.474:16736): avc: denied { map } for pid=18037 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.474662] audit: type=1400 audit(1576158811.474:16737): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.499130] audit: type=1400 audit(1576158811.474:16738): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.524455] audit: type=1400 audit(1576158811.484:16739): avc: denied { map } for pid=18037 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.547331] audit: type=1400 audit(1576158811.484:16740): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.572446] audit: type=1400 audit(1576158811.484:16741): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.598843] audit: type=1400 audit(1576158811.484:16742): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.623288] audit: type=1400 audit(1576158811.484:16743): avc: denied { map } for pid=18037 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.660355] device bridge_slave_1 left promiscuous mode [ 595.666126] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.721356] device bridge_slave_0 left promiscuous mode [ 595.726969] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.745888] audit: type=1400 audit(1576158811.804:16744): avc: denied { map } for pid=18038 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 595.783888] device bridge_slave_1 left promiscuous mode [ 595.789452] bridge0: port 2(bridge_slave_1) entered disabled state 13:53:31 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f00000013c0)={0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec03, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 595.832800] device bridge_slave_0 left promiscuous mode [ 595.838391] bridge0: port 1(bridge_slave_0) entered disabled state 13:53:31 executing program 3: syz_emit_ethernet(0x13, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000"}}}, 0x0) 13:53:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='.Qev/\xff\x0f\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x1, &(0x7f00000000c0)={0x3b82}, 0x8) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 595.927835] device bridge_slave_1 left promiscuous mode [ 595.936214] bridge0: port 2(bridge_slave_1) entered disabled state 13:53:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000140)=""/142, 0x8e}], 0x1) 13:53:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 596.015145] device bridge_slave_0 left promiscuous mode [ 596.033867] bridge0: port 1(bridge_slave_0) entered disabled state 13:53:32 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x1, r4, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 596.524837] device hsr_slave_1 left promiscuous mode [ 596.557782] device hsr_slave_0 left promiscuous mode [ 596.615563] team0 (unregistering): Port device team_slave_1 removed [ 596.639119] team0 (unregistering): Port device team_slave_0 removed [ 596.664788] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 596.695066] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 596.857719] bond0 (unregistering): Released all slaves [ 596.980964] device hsr_slave_1 left promiscuous mode [ 597.024138] device hsr_slave_0 left promiscuous mode [ 597.058085] team0 (unregistering): Port device team_slave_1 removed [ 597.084419] team0 (unregistering): Port device team_slave_0 removed [ 597.123489] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 597.185354] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 597.255885] bond0 (unregistering): Released all slaves [ 597.342891] device hsr_slave_1 left promiscuous mode [ 597.382631] device hsr_slave_0 left promiscuous mode [ 597.422856] team0 (unregistering): Port device team_slave_1 removed [ 597.432905] team0 (unregistering): Port device team_slave_0 removed [ 597.442656] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 597.483010] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 597.565161] bond0 (unregistering): Released all slaves [ 600.901031] IPVS: ftp: loaded support on port[0] = 21 [ 601.662505] IPVS: ftp: loaded support on port[0] = 21 [ 601.741674] chnl_net:caif_netlink_parms(): no params data found [ 601.784892] kauditd_printk_skb: 76 callbacks suppressed [ 601.784899] audit: type=1400 audit(1576158817.844:16821): avc: denied { map } for pid=18074 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.847539] audit: type=1400 audit(1576158817.844:16822): avc: denied { map } for pid=18074 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.869817] audit: type=1400 audit(1576158817.844:16823): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.869835] audit: type=1400 audit(1576158817.844:16824): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.869850] audit: type=1400 audit(1576158817.854:16825): avc: denied { map } for pid=18074 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.943027] IPVS: ftp: loaded support on port[0] = 21 [ 601.950833] audit: type=1400 audit(1576158817.854:16826): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 601.977862] audit: type=1400 audit(1576158817.854:16827): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.002937] audit: type=1400 audit(1576158817.854:16828): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.002956] audit: type=1400 audit(1576158817.854:16829): avc: denied { map } for pid=18074 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.065168] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.072236] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.079234] device bridge_slave_0 entered promiscuous mode [ 602.089342] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.095844] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.102797] device bridge_slave_1 entered promiscuous mode [ 602.134879] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 602.165938] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 602.239822] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 602.248044] team0: Port device team_slave_0 added [ 602.259471] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 602.268164] team0: Port device team_slave_1 added [ 602.276946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 602.286599] chnl_net:caif_netlink_parms(): no params data found [ 602.297448] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 602.383787] device hsr_slave_0 entered promiscuous mode [ 602.410366] device hsr_slave_1 entered promiscuous mode [ 602.466053] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 602.477106] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 602.515791] audit: type=1400 audit(1576158818.574:16830): avc: denied { map } for pid=18076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.615330] chnl_net:caif_netlink_parms(): no params data found [ 602.629694] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.640683] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.647646] device bridge_slave_0 entered promiscuous mode [ 602.659510] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.666018] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.673205] device bridge_slave_1 entered promiscuous mode [ 602.687081] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.693491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.700734] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.707468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.734545] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 602.748155] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 602.782149] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 602.789427] team0: Port device team_slave_0 added [ 602.799980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 602.807264] team0: Port device team_slave_1 added [ 602.816990] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.827443] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.839794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 602.873159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 602.892446] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.898874] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.907412] device bridge_slave_0 entered promiscuous mode [ 602.932271] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.939161] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.949155] device bridge_slave_1 entered promiscuous mode [ 603.003206] device hsr_slave_0 entered promiscuous mode [ 603.040509] device hsr_slave_1 entered promiscuous mode [ 603.101950] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 603.113497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 603.123221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 603.137451] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 603.167451] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 603.174926] team0: Port device team_slave_0 added [ 603.183919] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 603.194078] team0: Port device team_slave_1 added [ 603.202723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 603.219855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 603.235846] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 603.302423] device hsr_slave_0 entered promiscuous mode [ 603.340591] device hsr_slave_1 entered promiscuous mode [ 603.397237] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 603.413705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.421911] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 603.445162] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 603.467341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 603.478542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 603.486824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.511218] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 603.517352] 8021q: adding VLAN 0 to HW filter on device team0 [ 603.533078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 603.545852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 603.555105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 603.565472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.573360] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.579711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.618602] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 603.626178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 603.636622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.644765] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.651168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.673464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 603.686124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 603.703173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 603.713570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.724894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 603.740542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 603.747757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 603.756968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 603.767326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 603.782678] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 603.799763] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 603.809085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 603.818964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 603.826187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.833570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 603.841567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 603.859052] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 603.865657] 8021q: adding VLAN 0 to HW filter on device team0 [ 603.884820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 603.892662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 603.902280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.909914] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.916317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.923986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 603.932840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 603.940316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 603.952569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 603.966157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 603.977626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 603.985655] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.993877] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.000279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.022478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 604.038345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 604.049699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 604.058326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 604.066010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.079285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 604.092010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 604.102336] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.108400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.133460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 604.143068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 604.154249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 604.171146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 604.177979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 604.199241] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.209029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 604.216930] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 604.224840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 604.235296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 604.253282] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 604.260965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 604.270605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.277375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 604.288956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 604.296650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.305299] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 604.320541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 604.327575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.336874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 604.352100] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 604.358195] 8021q: adding VLAN 0 to HW filter on device team0 [ 604.377070] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 604.388210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 604.396149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.403879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.411729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.419255] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.425653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.433692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 604.445490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.457320] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.466010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.475504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 604.488617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 604.499288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.510876] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.517294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.548342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 604.558705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 604.579240] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.596481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 604.608113] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 604.619934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 604.630475] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.638138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 604.664363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 604.673578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 604.685051] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 604.714410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 604.725294] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.733365] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 604.743192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 604.753277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 604.776666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 604.786221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 604.803027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.819747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 604.831725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 604.839587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.859380] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.866770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.928194] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.964501] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 604.980638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.987480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 605.052633] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 606.817688] kauditd_printk_skb: 272 callbacks suppressed [ 606.817697] audit: type=1400 audit(1576158822.874:17103): avc: denied { map } for pid=18113 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 606.999997] audit: type=1400 audit(1576158822.884:17104): avc: denied { map } for pid=18113 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.208488] audit: type=1400 audit(1576158823.264:17105): avc: denied { map } for pid=18119 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.256990] audit: type=1400 audit(1576158823.264:17106): avc: denied { map } for pid=18119 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.283407] audit: type=1400 audit(1576158823.274:17107): avc: denied { map } for pid=18119 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.312047] audit: type=1400 audit(1576158823.274:17108): avc: denied { map } for pid=18119 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.340523] audit: type=1400 audit(1576158823.274:17109): avc: denied { map } for pid=18119 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.368109] audit: type=1400 audit(1576158823.284:17110): avc: denied { map } for pid=18119 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.370127] protocol 88fb is buggy, dev hsr_slave_0 [ 607.397355] audit: type=1400 audit(1576158823.284:17111): avc: denied { map } for pid=18119 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.397902] protocol 88fb is buggy, dev hsr_slave_1 [ 607.426258] audit: type=1400 audit(1576158823.294:17112): avc: denied { map } for pid=18119 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.460191] protocol 88fb is buggy, dev hsr_slave_0 [ 607.465284] protocol 88fb is buggy, dev hsr_slave_1 [ 607.520136] protocol 88fb is buggy, dev hsr_slave_0 [ 607.525538] protocol 88fb is buggy, dev hsr_slave_1 13:53:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) 13:53:43 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000017c0)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 13:53:43 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x212440, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:53:43 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @random="defffe070005", [], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x10, 0x3a, 0x0, @remote, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ae946c", 0x0, "3b0af3"}}}}}}}, 0x0) 13:53:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r2, 0x0, 0x80000003) 13:53:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) socket$unix(0x1, 0x2, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 607.677930] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 607.677930] program syz-executor.4 not setting count and/or reply_len properly 13:53:43 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) rename(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./file0\x00') 13:53:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x10004, 0x0, 0xd000, 0x1000, &(0x7f000003a000/0x1000)=nil}) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r6 = dup2(r4, r5) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(r4, r6, &(0x7f0000fde000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="f30f01df66baf80cb84f5a388def66bafc0cecb99a0300000f320f380b85ce50000026d14a7c360f01f60f0051d0b89d0000000f23c00f21f83502000c000f23f8b9800000c00f3235008000000f300f01cb", 0x52}], 0x1, 0x52, &(0x7f0000000140)=[@cr4={0x1, 0x820060}], 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:44 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = dup2(r1, r2) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r6) socket$kcm(0x2, 0x3, 0x2) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selin\x88nz\xcaheckr\x03\x00\x00\x00ot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r7, 0x28, &(0x7f0000000640)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={r9, 0x816, 0x8}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') connect$llc(r3, &(0x7f0000000240)={0x1a, 0x323, 0x0, 0x5, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) pwritev(r5, &(0x7f00000006c0)=[{&(0x7f00000002c0)="7c0038db8b2baa88ff9d1f5c2ee534df2dce2255f2ccac20cd409a132d094a9daddb60bdc8fa133dd41617eaf6553c18035d6ef8b0a796ee8202992acb74a4e9fe1ceaec94273531148a4b6a9f7d46a29e7c62baded2177cf3bd7e8407defb59483fdf75f2bbc8caf20077d55086e3e4427124388acc1f2d3590541119665ed1888bfa234308cc88da5862cea98d2509b70498cf0235a0dff7adae636b219216ac9de417e711429f7d1935b5fc2a56cf32742f057022ba54f295a1f19ad940491347cc8757d305d27727ceb67bf2855e93fcc1078d8e54ac571478b9", 0xdc}, {&(0x7f00000003c0)="0b4507698a3e0216b08fd7041816dd15988ff483ed4e9cd8e590e3e8981792f081ad7e4f46d3d5b7376a3a19966564bdebec5a517c1ab7066643227b2c54fe125b8b5ec01c7d5d00553e8f9d8f7d03eb1d5e11fcbc6343fcae3ebe6eb23d960e207ac2ffba8c1a27c457e9c5b985afff44498a2227e39132da9afaacd253fb451397cf3d271266b9da7c5fdf559550414888379d608341b1cf1ed6bfb92d90dfd7067771f321ce71ccb3b4767618edc6e2bfea62cfca14d7391770", 0xbb}, {&(0x7f0000000480)="dbb3cc5d4b7cb7abfae33084a6f2d43d0b2eaa4633b415e05f455b40304b7f6acd2c5ac5d0c49b4eb67bb7a70c92d20f65b99da82a5036675a8c97661715a0846bca", 0x42}, {&(0x7f0000000940)="c6329a35cd2533badbcb8e4128b59d7852b4f503958b3f12d38716a99def0b16dda4bf0eea2d2ec99a7ebb444090a8a98bcd1e1e61841186359834a8173b539253e1901e71378cd0c7f700251de55c4648dd71a72934991ad90445a0a9d05db427ed72d77f85532cd6f56df79cc36766396bd3145e2106240b5f4fe58c7b458165ad528d1a3178ba57dab787da72e2ba242ff4bf87871a17720d5fdfeeef23e8f4665a977e85e536c1b50e69a9e234746f219ab7bcf4ce4cdf42ebbcd7c5feaad7f6f70046ecc463dbd9c2887d5248c0065a8ac377d6ee02", 0xd8}, {&(0x7f0000000500)="396576e926a8a6d0a929385bb8069b054eb16ecce9094e686de3b048fc1eac396d374128a24e933f34e267efc8e5bf2daa75816082a7c8673b15c4d2e21e46ec2058d55281903ac538a213a574c8d0b16c79cf643a1b4ec77963ddc3d0ba3558fb8e54d87431e2a023f1d9abdf3db18bba06ab371499e170e5cac84c0589913ebb3062ecc6d086df8858b90c9e33f0e15a3939c5e0a276894abc0f693cc5ed875e794941b7ad0c418b4cc85c1fbb71c30cd0", 0xb2}], 0x5, 0x100000001) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000001e80)=0xeb0f) r12 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r12, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)=""/212, 0xd4}, 0x10000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_migrate\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x9a60c0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000100)={0xe8, &(0x7f00000000c0)=[{0x2, 0x5c, 0x5}, {0x0, 0x0, 0x8, 0x2}, {0x0, 0x7f, 0xa6, 0xf98c}, {0x8001, 0x3, 0x5, 0x5}, {0x7f, 0x3, 0x3, 0x10000}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000890}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="090000fe", @ANYRES16=r4, @ANYBLOB="200029bd7000ffdbdf25010000001400040009000000000000800180000091000000080002000400000008000600fd00000014000100fe8000000000000000000000000000bb"], 0x4c}, 0x1, 0x0, 0x0, 0x20000805}, 0x8000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 13:53:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) socket$unix(0x1, 0x2, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 608.710119] protocol 88fb is buggy, dev hsr_slave_0 [ 608.715289] protocol 88fb is buggy, dev hsr_slave_1 [ 609.030126] protocol 88fb is buggy, dev hsr_slave_0 [ 609.035275] protocol 88fb is buggy, dev hsr_slave_1 13:53:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfebd, 0x0, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) 13:53:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x3, 0x20, 0x4, 0x3a, 0x4, 0x4b, 0xd7, 0x6, 0x2, 0x1, 0x3}, 0xb) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f00000002c0)=""/114) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f0000000340)='./file0\x00', 0xff, 0x7, &(0x7f00000026c0)=[{&(0x7f0000000380)="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", 0x1000, 0x81c}, {&(0x7f0000001380)="7c0f9ade033ca44bddd52f1706a69a3af8a550ac3d2bba3df1320e6ca6843b46c71bca5af433bdf4b085059fc6e8d66d7e5ecc671af3986e4f2a97ead6bfee4140fbee7cfbf78c0eb56618b1b0afc819edde11ad50db6705c704f8a6306f9e5216185c9e62bd0311f6f7be794163f483ca7dab0f72ed83db05bdb0529bad352d6a00aa2904019bfeae75f8f6fe3c85cb95eb2501578f0b79561bea", 0x9b, 0x80000000}, {&(0x7f0000001440)="f1b594a47ae5df6d74bf4bec309acdb8f02a9099b850b3eaeaa9fa7d5bd39eac892f10c80deb6ff1810bca1e78a76c49b71c9f3a2033f732a9b50da50d835392b40f699e9fc94d1d034946721547e3f774fd782b114b8642629896490088d06350ace9e3b6ab1868245b720cb402ac48435167614c604b3fbf53878cf1a54ff749f5d3bd237554ac70bb", 0x8a, 0xfffffffffffffff8}, {&(0x7f0000001500)="490d31cfa5d9faad17a0bee954", 0xd, 0x9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="01a7036e01266dfcea77f0e2ae58dd994237d9269bab0f79f9ef6aa0bb482f41b68559950134837d27299f72128115061264f420d6131154b97d346c957e378d867ca5ecbf736074eb35ddd114ad7d7bf666404fa6b367cfdc409b42de74f2f00e04897d240dacfc3e49e6ae191cdc11f47ffec2689fbb8e2b5c7ea49741fb21d503fd68d0ca40bec6e0b762c2", 0x8d, 0x9}, {&(0x7f0000002600)="c918d35c0fb68d7e64bf8a80e6838fc5400d8ecc8bf021231956b73a1f174403480b98f719eecdf68fef1a6861c6bc2b7b5bf196ac28cc30f1386e4ff1db17bf872614d6e5c35cde3ebdeb37e5d3d643b4a51f22545f80fd96555dc06f7a6f1dc8714513b0bc14265814dda335f7256e31617291fe7cb6ef703f743efff632acd86116f613af910a3e6b39cf9310727413d37a892fe48f68140ba962dc25c54f2d5e43e3b9da09ba0a835c7d740adcf2e97230abc648c7a6", 0xb8, 0x5}], 0x0, &(0x7f0000002780)={[{@balloc_border='block-allocator=border'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@expose_privroot='expose_privroot'}, {@noattrs='noattrs'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@errors_continue='errors=continue'}], [{@dont_appraise='dont_appraise'}]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000040)={0xd000, 0x0, 0x0, r4, 0x2}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) ioctl$KVM_RUN(r6, 0xae80, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r9 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r8, r9) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000001c0)={0x10201, 0x3, 0xb0803, 0x2000, &(0x7f0000fec000/0x2000)=nil}) 13:53:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfebd, 0x0, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) 13:53:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfebd, 0x0, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 610.010520] device bridge_slave_1 left promiscuous mode [ 610.016083] bridge0: port 2(bridge_slave_1) entered disabled state 13:53:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) socket$unix(0x1, 0x2, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 610.116028] device bridge_slave_0 left promiscuous mode [ 610.123194] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.207686] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 610.207686] [ 610.626780] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 610.626780] [ 610.751632] device hsr_slave_1 left promiscuous mode 13:53:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = getpgrp(r6) fcntl$setown(r4, 0x8, r7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 610.820229] device hsr_slave_0 left promiscuous mode [ 610.892410] team0 (unregistering): Port device team_slave_1 removed [ 610.956558] team0 (unregistering): Port device team_slave_0 removed [ 611.025307] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 611.078456] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 611.353785] bond0 (unregistering): Released all slaves [ 611.827104] kauditd_printk_skb: 151 callbacks suppressed [ 611.827113] audit: type=1400 audit(1576158827.884:17264): avc: denied { map } for pid=18214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 611.962581] audit: type=1400 audit(1576158827.884:17265): avc: denied { map } for pid=18214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.130108] audit: type=1400 audit(1576158827.914:17266): avc: denied { map } for pid=18214 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.254175] audit: type=1400 audit(1576158827.914:17267): avc: denied { map } for pid=18214 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.367993] audit: type=1400 audit(1576158827.934:17268): avc: denied { map } for pid=18214 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.474790] audit: type=1400 audit(1576158827.964:17269): avc: denied { map } for pid=18215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.560118] audit: type=1400 audit(1576158827.964:17270): avc: denied { map } for pid=18215 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.604846] audit: type=1400 audit(1576158827.964:17271): avc: denied { map } for pid=18215 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.680767] audit: type=1400 audit(1576158827.964:17272): avc: denied { map } for pid=18215 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 612.741638] audit: type=1400 audit(1576158827.964:17273): avc: denied { map } for pid=18214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.551351] IPVS: ftp: loaded support on port[0] = 21 [ 615.536340] chnl_net:caif_netlink_parms(): no params data found [ 615.722691] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.729169] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.737747] device bridge_slave_0 entered promiscuous mode [ 615.748814] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.756767] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.764044] device bridge_slave_1 entered promiscuous mode [ 615.795632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 615.816989] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 615.858346] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 615.867969] team0: Port device team_slave_0 added [ 615.876811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 615.887505] team0: Port device team_slave_1 added [ 615.899782] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 615.915787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 615.983578] device hsr_slave_0 entered promiscuous mode [ 616.020439] device hsr_slave_1 entered promiscuous mode [ 616.068103] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 616.086936] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 616.149449] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.155915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.162602] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.168976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.343482] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 616.349601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 616.372436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 616.396848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.408490] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.422612] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.447960] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 616.456578] 8021q: adding VLAN 0 to HW filter on device team0 [ 616.473401] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 616.514800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 616.532301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 616.543961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.563091] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.569498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.618347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 616.633126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 616.650970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.658892] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.665544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.697632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 616.714900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 616.735516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 616.742944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 616.765715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 616.773025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 616.783615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 616.801971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 616.816078] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 616.830740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 616.839037] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 616.859177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 616.868133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 616.884726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 616.919129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 616.942674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 616.963187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 616.983736] device bridge_slave_1 left promiscuous mode [ 616.989253] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.060949] device bridge_slave_0 left promiscuous mode [ 617.066516] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.125460] device bridge_slave_1 left promiscuous mode [ 617.131729] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.180976] device bridge_slave_0 left promiscuous mode [ 617.190985] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.323775] device hsr_slave_1 left promiscuous mode [ 617.362924] device hsr_slave_0 left promiscuous mode [ 617.414486] team0 (unregistering): Port device team_slave_1 removed [ 617.424181] team0 (unregistering): Port device team_slave_0 removed [ 617.434117] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 617.475088] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 617.533956] bond0 (unregistering): Released all slaves [ 617.632035] device hsr_slave_1 left promiscuous mode [ 617.673253] device hsr_slave_0 left promiscuous mode [ 617.713004] team0 (unregistering): Port device team_slave_1 removed [ 617.724977] team0 (unregistering): Port device team_slave_0 removed [ 617.735083] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 617.775138] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 617.864864] bond0 (unregistering): Released all slaves [ 617.965858] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 617.972083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 618.003978] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 618.014566] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 618.021401] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 618.028284] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 618.047965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 618.067354] kauditd_printk_skb: 117 callbacks suppressed [ 618.067361] audit: type=1400 audit(1576158834.124:17391): avc: denied { map } for pid=18227 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.099789] audit: type=1400 audit(1576158834.124:17392): avc: denied { map } for pid=18227 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.127417] audit: type=1400 audit(1576158834.134:17393): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.159164] audit: type=1400 audit(1576158834.134:17394): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.188608] audit: type=1400 audit(1576158834.134:17395): avc: denied { map } for pid=18227 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.211534] audit: type=1400 audit(1576158834.144:17396): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.246755] audit: type=1400 audit(1576158834.144:17397): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.276667] audit: type=1400 audit(1576158834.144:17398): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.304231] audit: type=1400 audit(1576158834.144:17399): avc: denied { map } for pid=18227 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 618.334365] audit: type=1400 audit(1576158834.174:17400): avc: denied { map } for pid=18228 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 620.480306] protocol 88fb is buggy, dev hsr_slave_0 [ 620.485496] protocol 88fb is buggy, dev hsr_slave_1 [ 620.610964] IPVS: ftp: loaded support on port[0] = 21 13:53:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x4300, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000100)={r5, 0xc0000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = openat$cgroup_ro(r6, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000001c0)={0x3000, &(0x7f0000000140), 0x0, r8, 0x4}) 13:53:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) socket$unix(0x1, 0x2, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 13:53:56 executing program 4 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) [ 620.802544] FAULT_INJECTION: forcing a failure. [ 620.802544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.818884] CPU: 0 PID: 18246 Comm: syz-executor.4 Not tainted 4.14.158-syzkaller #0 [ 620.826811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.836179] Call Trace: [ 620.838771] dump_stack+0x142/0x197 [ 620.842390] should_fail.cold+0x10f/0x159 [ 620.846526] __alloc_pages_nodemask+0x1d6/0x7a0 [ 620.851183] ? __alloc_pages_slowpath+0x2930/0x2930 [ 620.856192] ? tun_get_user+0x199d/0x3b00 [ 620.860339] alloc_pages_current+0xec/0x1e0 [ 620.864667] skb_page_frag_refill+0x1ef/0x490 [ 620.869174] tun_get_user+0x1a27/0x3b00 [ 620.874638] ? trace_hardirqs_on+0x10/0x10 [ 620.878873] ? tun_net_xmit+0xf40/0xf40 [ 620.882869] ? find_held_lock+0x35/0x130 [ 620.887098] ? __tun_get+0x120/0x220 [ 620.890918] ? lock_downgrade+0x740/0x740 [ 620.895064] tun_chr_write_iter+0xdd/0x18d [ 620.899290] do_iter_readv_writev+0x418/0x670 [ 620.903774] ? vfs_dedupe_file_range+0x8f0/0x8f0 [ 620.908604] ? rw_verify_area+0xea/0x2b0 [ 620.912997] do_iter_write+0x154/0x540 [ 620.916873] ? dup_iter+0x260/0x260 [ 620.920482] ? save_trace+0x290/0x290 [ 620.924268] vfs_writev+0x170/0x2a0 [ 620.927886] ? vfs_iter_write+0xb0/0xb0 [ 620.931852] ? __fget+0x237/0x370 [ 620.935488] ? __fget_light+0x172/0x1f0 [ 620.939458] do_writev+0x10a/0x2d0 [ 620.942987] ? vfs_writev+0x2a0/0x2a0 [ 620.946866] ? SyS_readv+0x30/0x30 [ 620.950391] SyS_writev+0x28/0x30 [ 620.953833] do_syscall_64+0x1e8/0x640 [ 620.957719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 620.962553] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 620.967727] RIP: 0033:0x45a7c1 [ 620.970909] RSP: 002b:00007f929cbb5ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 620.978624] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 000000000045a7c1 [ 620.985888] RDX: 0000000000000001 RSI: 00007f929cbb5c00 RDI: 00000000000000f0 [ 620.993236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 621.000491] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f929cbb66d4 [ 621.007744] R13: 00000000004cab3c R14: 00000000004e3f40 R15: 0000000000000003 13:53:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:53:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2c654d595da20f57, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) socket$unix(0x1, 0x2, 0x0) 13:53:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 621.371489] IPVS: ftp: loaded support on port[0] = 21 [ 621.722021] chnl_net:caif_netlink_parms(): no params data found [ 622.420395] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.426864] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.473928] device bridge_slave_0 entered promiscuous mode [ 622.497468] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.520184] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.540216] device bridge_slave_1 entered promiscuous mode [ 622.699424] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 622.723136] chnl_net:caif_netlink_parms(): no params data found [ 622.740350] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 622.781971] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 622.789187] team0: Port device team_slave_0 added [ 622.798444] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 622.811970] team0: Port device team_slave_1 added [ 622.828447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 622.849168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 622.933547] device hsr_slave_0 entered promiscuous mode [ 622.971127] device hsr_slave_1 entered promiscuous mode [ 623.013886] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 623.034129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 623.062102] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.068554] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.076250] device bridge_slave_0 entered promiscuous mode [ 623.088743] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.097473] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.104703] device bridge_slave_1 entered promiscuous mode [ 623.135110] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 623.154523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 623.162758] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.169121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.175739] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.182098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.199015] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.205936] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.224101] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 623.231738] team0: Port device team_slave_0 added [ 623.243273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 623.250946] team0: Port device team_slave_1 added [ 623.259433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 623.269683] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 623.277898] device bridge_slave_1 left promiscuous mode [ 623.284814] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.343025] device bridge_slave_0 left promiscuous mode [ 623.348500] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.473379] device hsr_slave_1 left promiscuous mode [ 623.532953] device hsr_slave_0 left promiscuous mode [ 623.593320] team0 (unregistering): Port device team_slave_1 removed [ 623.604079] team0 (unregistering): Port device team_slave_0 removed [ 623.613409] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 623.673269] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 623.754674] bond0 (unregistering): Released all slaves [ 623.872367] device hsr_slave_0 entered promiscuous mode [ 623.920549] device hsr_slave_1 entered promiscuous mode [ 623.967554] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 623.977485] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 624.043750] kauditd_printk_skb: 135 callbacks suppressed [ 624.043759] audit: type=1400 audit(1576158840.104:17536): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 624.049513] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 624.104375] audit: type=1400 audit(1576158840.134:17537): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 624.134361] audit: type=1400 audit(1576158840.154:17538): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/root/syzkaller-shm328408150" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 624.220523] audit: type=1400 audit(1576158840.154:17539): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/root/syzkaller-shm835719101" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 624.253046] audit: type=1400 audit(1576158840.164:17540): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.279904] audit: type=1400 audit(1576158840.164:17541): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.314934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 624.350348] audit: type=1400 audit(1576158840.174:17542): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.390861] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 624.413779] audit: type=1400 audit(1576158840.174:17543): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.430769] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 624.460636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 624.471273] audit: type=1400 audit(1576158840.184:17544): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.474705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 624.504908] audit: type=1400 audit(1576158840.194:17545): avc: denied { map } for pid=18273 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 624.559535] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 624.574845] 8021q: adding VLAN 0 to HW filter on device team0 [ 624.616779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 624.634962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 624.648631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 624.661846] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.668226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.686427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 624.701544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 624.718651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 624.726538] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.732912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 624.757712] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 624.778494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 624.785113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 624.804622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 624.816475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 624.829503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 624.854456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 624.871251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 624.879076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 624.898420] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 624.917864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 624.928006] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 624.938074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 624.949028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 624.957189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 624.968816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 624.986767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 624.993935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 625.005735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 625.015461] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 625.021702] 8021q: adding VLAN 0 to HW filter on device team0 [ 625.039118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 625.052594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 625.068960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 625.079351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 625.094535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 625.111130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.118833] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.125251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.133567] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 625.139766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 625.154035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 625.161390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 625.168462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 625.177239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 625.185105] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.191480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.212671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 625.220162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 625.242987] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 625.252997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 625.261645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 625.273068] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 625.285003] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 625.294889] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 625.307601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 625.329938] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 625.337226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 625.354021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 625.375292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 625.387936] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 625.400863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 625.409117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 625.429736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 625.438086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 625.450687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 625.469489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 625.476648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 625.486245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 625.513262] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 625.519380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 625.601102] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 625.616094] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 625.622750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 625.629601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 625.660613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 625.981375] IPVS: ftp: loaded support on port[0] = 21 [ 626.936055] chnl_net:caif_netlink_parms(): no params data found [ 627.250569] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.264869] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.303226] device bridge_slave_0 entered promiscuous mode [ 627.494547] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.505413] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.515809] device bridge_slave_1 entered promiscuous mode [ 627.568664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 627.585536] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 627.593757] protocol 88fb is buggy, dev hsr_slave_0 [ 627.593804] protocol 88fb is buggy, dev hsr_slave_1 [ 627.627930] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 627.635670] team0: Port device team_slave_0 added [ 627.661897] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 627.669255] team0: Port device team_slave_1 added [ 627.689182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 627.707291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 627.750111] protocol 88fb is buggy, dev hsr_slave_0 [ 627.755242] protocol 88fb is buggy, dev hsr_slave_1 [ 627.783752] device hsr_slave_0 entered promiscuous mode [ 627.820568] device hsr_slave_1 entered promiscuous mode [ 627.863267] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 627.873870] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 627.906009] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 13:54:04 executing program 2 (fault-call:3 fault-nth:0): mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:04 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:04 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80322, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r5, 0x9, 0x20}, 0xc) dup2(r0, r1) r6 = dup(r1) ioctl$NS_GET_NSTYPE(r6, 0xb703, 0x0) 13:54:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x14640, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x101fe, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x1df, 0x8, 0x0, 0xffffffffffffff2f) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r6 = dup3(r4, r5, 0x0) dup3(r6, 0xffffffffffffffff, 0x80000) [ 627.995560] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 628.001867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 628.023492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 628.074203] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 628.115731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 628.127480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 628.145649] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 628.163376] FAULT_INJECTION: forcing a failure. [ 628.163376] name failslab, interval 1, probability 0, space 0, times 0 [ 628.179385] 8021q: adding VLAN 0 to HW filter on device team0 [ 628.214937] CPU: 1 PID: 18309 Comm: syz-executor.3 Not tainted 4.14.158-syzkaller #0 [ 628.222921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.232282] Call Trace: [ 628.234880] dump_stack+0x142/0x197 [ 628.238521] should_fail.cold+0x10f/0x159 [ 628.242693] should_failslab+0xdb/0x130 [ 628.246679] kmem_cache_alloc+0x47/0x780 [ 628.250757] avc_alloc_node+0x27/0x4d0 [ 628.254652] ? trace_hardirqs_on_caller+0x400/0x590 [ 628.259694] avc_compute_av+0x185/0x570 13:54:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:'}, &(0x7f0000000240)='n', 0x1, r0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/112, 0x70) syz_emit_ethernet(0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="aa90aaaaaaaac2b31dec2e80886394a70343b8e8"], 0x0) [ 628.263683] avc_has_perm+0x345/0x4b0 [ 628.267489] ? avc_has_perm_noaudit+0x420/0x420 [ 628.272165] ? __lock_acquire+0x5f7/0x4620 [ 628.276410] ? lock_downgrade+0x740/0x740 [ 628.280565] inode_has_perm.isra.0+0x154/0x1e0 [ 628.285159] selinux_mmap_file+0xe2/0x1b0 [ 628.289316] ? selinux_file_ioctl+0x560/0x560 [ 628.293815] ? __fget+0x210/0x370 [ 628.297279] ? selinux_file_ioctl+0x560/0x560 [ 628.301783] security_mmap_file+0x95/0x1a0 [ 628.306029] vm_mmap_pgoff+0xdb/0x1d0 [ 628.309838] ? vma_is_stack_for_current+0xa0/0xa0 [ 628.314707] ? __fget+0x237/0x370 [ 628.318180] SyS_mmap_pgoff+0x3ca/0x520 [ 628.322166] ? find_mergeable_anon_vma+0x2c0/0x2c0 [ 628.327106] ? do_syscall_64+0x53/0x640 [ 628.331084] ? align_vdso_addr+0x60/0x60 [ 628.335162] SyS_mmap+0x16/0x20 [ 628.338447] do_syscall_64+0x1e8/0x640 [ 628.342334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 628.347176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.347185] RIP: 0033:0x45a909 [ 628.347191] RSP: 002b:00007f77fa58bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 628.347206] RAX: ffffffffffffffda RBX: 00007f77fa58bc90 RCX: 000000000045a909 [ 628.370578] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000020701000 [ 628.377871] RBP: 000000000075bf20 R08: 0000000000000003 R09: 0000000000000000 [ 628.385144] R10: 0000000000000012 R11: 0000000000000246 R12: 00007f77fa58c6d4 [ 628.392416] R13: 00000000004c7b98 R14: 00000000004de960 R15: 0000000000000004 13:54:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x5a142ac20edf04d5, 0x0) bind$x25(r3, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x222, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000100)='syzkaller0\x00', 0x6, 0x6, 0xf800}) dup2(r1, r2) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r6 = eventfd(0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) accept$alg(r7, 0x0, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 628.410317] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 13:54:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) dup3(r4, r5, 0x0) [ 628.451496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 628.458573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 628.500590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 628.508289] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.514692] bridge0: port 1(bridge_slave_0) entered forwarding state 13:54:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:anacron_exec_t:s0\x00', 0x24, 0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x2ae1cbce4cb690b1, &(0x7f0000000380)=ANY=[]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)={0x2e, 0x4, 0x0, {0x1, 0x0, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f00000001c0)=0x4) [ 628.611923] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 628.619146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 628.640939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 628.648824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 13:54:04 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r3, 0x9, 0x5, [0xffff, 0x7, 0x8, 0x2, 0x9]}, &(0x7f0000000080)=0x12) [ 628.700621] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.707036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.790260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 628.813095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 628.864924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 628.901004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 628.977574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 629.011358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 629.026591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.075224] kauditd_printk_skb: 234 callbacks suppressed [ 629.075233] audit: type=1400 audit(1576158845.134:17780): avc: denied { map } for pid=18330 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.119477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 629.157797] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.175464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 13:54:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000000c0)={0x0, 0x7fff}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) fsetxattr$security_smack_transmute(r7, &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x2) utime(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x7, 0x2e9}) socket$inet_sctp(0x2, 0x1, 0x84) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r8) ioctl$KVM_GET_NR_MMU_PAGES(r5, 0xae45, 0x1) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x101080, 0x0) pwritev(r9, &(0x7f0000000480)=[{&(0x7f0000000140)="150092de18", 0x5}, {&(0x7f0000000180)="3eac3d3e864ba28e6949926bfd0181d072f3ba49d24b334f222b2204da59d0163c8693c40c6a81d89bbfecdea17fbccb0235f330d861269f7b5a963ddfcc90f9c550b58270383585240c059d41ad751853512c0c0cec77f9f1526724", 0x5c}, {&(0x7f00000002c0)="bc95d4ae5f8c186cf610cf4085d37da19571383ef70148da40e447f2b24842424a4a47209d6e4127f2000dbaf040438930c3fb4adddb31615129a8ea2a97bc948de055006f1beb513ea1a830ddfda289da567ce011de2ddb35ab7a4518cd13b7ca0e60cd6d6ec95ed91f701dd961e5c78ce1d12fa195462a869d8e90e7b3ad80abd86f6e32629a8d89594991f7b29fe0b2837bb9a6a62e1f09e140f9a16fa7641f88cfa1f56de1a07596303ffa47257e1be658c5b9df75ffec5d3ee09227b9b9923462ecc282fd", 0xc7}, {&(0x7f0000000240)="bbd2bfdc63281dc547b7f959557857fd6b0ea42a294a91117500647bfde1294e070a5423446700547e26cd", 0x2b}, {&(0x7f00000003c0)="205befd11f4fd4f62c1c25038b838610acb27283b9a64f82225cef623915ea959a5f6d228b1cc221b011fa9660d7f5714a811d281af274f6eb1eac94229efefb2760f4ade905b17e227ab86e707b28077b09c4223c4bb60c172932e52107fc67a633300eb3e99472fa301132654aa913f4f35f4cca99fa55ff9d74501b315e0e281afbbad99b95252f", 0x89}], 0x5, 0x198a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 629.212402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.254951] audit: type=1400 audit(1576158845.134:17781): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.312986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 629.347017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.365393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.393318] audit: type=1400 audit(1576158845.184:17782): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.441651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 629.537194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.560618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.600595] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 629.630346] audit: type=1400 audit(1576158845.184:17783): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.639203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.743643] audit: type=1400 audit(1576158845.184:17784): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.910522] audit: type=1400 audit(1576158845.274:17785): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 629.986889] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 630.056175] audit: type=1400 audit(1576158845.274:17786): avc: denied { map } for pid=18330 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.070050] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 630.143393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 630.159407] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 630.204839] audit: type=1400 audit(1576158845.494:17787): avc: denied { map } for pid=18307 comm="syz-executor.3" path="/dev/ashmem" dev="devtmpfs" ino=17227 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 630.307551] audit: type=1400 audit(1576158845.674:17788): avc: denied { map } for pid=18342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.311698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 630.408963] audit: type=1400 audit(1576158845.694:17789): avc: denied { map } for pid=18342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 632.550317] protocol 88fb is buggy, dev hsr_slave_0 [ 632.555427] protocol 88fb is buggy, dev hsr_slave_1 13:54:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xa0b00, 0x0) ioctl$CAPI_GET_SERIAL(r4, 0xc0044308, &(0x7f00000000c0)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, 0x0, 0x0) 13:54:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000040)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r3, 0x40044104, &(0x7f0000000080)=0x6407) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:09 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x3f412209f302f807, 0x0) dup2(r0, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r6 = socket$inet(0x2, 0x3, 0x1f) getsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f00000000c0)={@empty, @dev}, &(0x7f0000000140)=0xc) dup2(r4, r5) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "cb74b4a5b4a96d8040eaf14871166d073d276d3a"}, 0x15, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0x0) 13:54:09 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:09 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$smack_current(r1, &(0x7f0000000080)={'group_id'}, 0x9) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:09 executing program 4: getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) syz_emit_ethernet(0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaa940000000000000000000023ff025b9e47000000000000e7f16cb1a7a770edf89db2172b90f90a17e1eaaf8e753281d30ad033ae947bc50491e41650f2f08575dfe8f8420d35b0d21175ef2f2f213835df4300"/97], 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0502f800", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r3, 0x101}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f00000002c0)={r4, 0x8001}, 0x8) dup2(r0, r1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000180)={0x7, &(0x7f0000000040)=[{0x681, 0xf0}, {0x58aa, 0x400}, {0xfea, 0x3}, {0x1, 0xa792}, {0x1, 0x3}, {0x81, 0xfff}, {0x1ff, 0x3}]}) 13:54:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) 13:54:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) signalfd(r1, &(0x7f0000000040), 0x8) 13:54:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 634.087485] kauditd_printk_skb: 145 callbacks suppressed [ 634.087495] audit: type=1400 audit(1576158850.144:17935): avc: denied { map } for pid=18391 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:10 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x701000) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) [ 634.329795] audit: type=1400 audit(1576158850.164:17936): avc: denied { map } for pid=18391 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 13:54:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x9, 0x8}, {0x8, 0x8000}]}, 0x14, 0x6) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) setfsgid(r1) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={0x0, @remote, @initdev}, &(0x7f0000000200)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40000, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000180)={0x360, 0x4, 0x0, {0x1, 0x0, 0x0, 0x0, [0x0]}}, 0x28) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) 13:54:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1, 0x42000) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000100)={0x2, r4, 0x1}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) ioctl$FS_IOC_MEASURE_VERITY(r7, 0xc0046686, &(0x7f0000000240)=ANY=[@ANYBLOB="0200d400416e63ec051acf0461b13cab4a14ab04327738b60487042a9051254117c5e8272ec4260a4009888476654263943102f7b110946a4b9cd14a95aa15ea40589560471afaa340b499ed1e3ddad6e3e2e18c0aa0ad22a39366fc3c11222828a0dbdf75551ad4d988f8633512d6a49eb842ee6fff57c3582c3db5bb2ac031e63d81afe2ba1e9c8cadaeb31fc4d5056862e1d855791726aaddd70a0f445ce25bcb1355228b11f8769a770067cd788a1f661b9bab065445b57823445e0369274ac4debefdfa9559e9a3188f8b3a65"]) [ 634.551542] audit: type=1400 audit(1576158850.184:17937): avc: denied { map } for pid=18397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.731284] audit: type=1400 audit(1576158850.184:17938): avc: denied { map } for pid=18397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.945928] audit: type=1400 audit(1576158850.184:17939): avc: denied { map } for pid=18396 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:11 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="aad752b39aaac2b31dec2e808863f71b92c400e8"], 0x0) [ 635.053588] audit: type=1400 audit(1576158850.204:17940): avc: denied { map } for pid=18395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.252676] audit: type=1400 audit(1576158850.204:17941): avc: denied { map } for pid=18395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x50000, 0x0) sysfs$3(0x3) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000240)=0xfffffffe) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x300ece8ecbd9429d, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) read$usbmon(r3, &(0x7f0000000080)=""/163, 0xa3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/capx\x00\x00\x00\x00\x00\x94\x00', 0x3, 0x0) dup2(r6, r7) openat(r6, &(0x7f0000000140)='./file0\x00', 0x10000, 0x38) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x85000) dup2(r8, 0xffffffffffffffff) dup2(r5, r4) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000040)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) [ 635.433103] audit: type=1400 audit(1576158850.204:17942): avc: denied { map } for pid=18396 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.630509] device bridge_slave_1 left promiscuous mode [ 635.636332] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.661810] audit: type=1400 audit(1576158850.204:17943): avc: denied { map } for pid=18396 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:11 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="3d3030303030303030303030303030303030313030ec3030302c757365725f6964000000000000000300516896dd58700b875194e84f365b60b29857c6116d38cf2a76bd74f2b3d2ac89b0126dd8f06c1d2ee74ca4aa8e897fe83ea25923fc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="28000000040000000004000000000000010000000000000000000000000000eb0000000000000000981ad1529803c5a70b12fa39f222493d10d4f0796c35f0d6ca452b4751f10adcb8af11bdf60b4cfb8510d37e5661985dcf35de461fa7c9ecf758ee"], 0x28) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000340)={r3, 0x1, &(0x7f0000000180)=[0x3], &(0x7f00000001c0)=[0x4, 0x7cc], 0x63, 0x1, 0x6, &(0x7f00000002c0)=[0x4], &(0x7f0000000300)=[0xfff, 0x27, 0x9, 0xfffffe01, 0x4]}) [ 635.796878] audit: audit_backlog=65 > audit_backlog_limit=64 [ 635.834353] device bridge_slave_0 left promiscuous mode [ 635.839927] bridge0: port 1(bridge_slave_0) entered disabled state 13:54:12 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0)={0x8, 0x4, 0x1, 0x5}, 0x6) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x1400, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r2, 0x40184150, &(0x7f0000000000)={0x0, &(0x7f0000000080)="e7125ea9de55aedaec37dc0211b1c9c4033651ca5207346ba6fdeec3cc65845ac8f49885f52ba5a3d35993c28cb1eb9c0c6878142942b9921d19306299ce3feefab76e6428c66e025e351351fb7096df8ef741f00b849af3d81348140773fbe11e42252e33584ee8a593375c49c7f71a14fe5ea9bbaab589dc5df9e68b98516bcc940327b39f87851959a61b0bb1f3f08b62fd97768e946349166308dd5cf7330d74f7fe9f6e73effa8fedb7969fb1764aeaf1567edec2a6028464c2dad0685b9b53b31a35972841e0b9bc6aab9bc011d3ec896aecb7635f738b9345e1ed14b29393619d8952", 0xe6}) 13:54:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 636.516283] device hsr_slave_1 left promiscuous mode [ 636.566676] device hsr_slave_0 left promiscuous mode [ 636.658811] team0 (unregistering): Port device team_slave_1 removed [ 636.723864] team0 (unregistering): Port device team_slave_0 removed [ 636.806052] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 636.905499] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 637.094454] bond0 (unregistering): Released all slaves [ 639.271065] IPVS: ftp: loaded support on port[0] = 21 [ 640.169190] chnl_net:caif_netlink_parms(): no params data found [ 640.194759] kauditd_printk_skb: 170 callbacks suppressed [ 640.194767] audit: type=1400 audit(1576158856.254:18100): avc: denied { map } for pid=18474 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.226192] audit: type=1400 audit(1576158856.254:18101): avc: denied { map } for pid=18474 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.250008] audit: type=1400 audit(1576158856.254:18102): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.275014] audit: type=1400 audit(1576158856.254:18103): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.299784] audit: type=1400 audit(1576158856.264:18104): avc: denied { map } for pid=18474 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.326122] audit: type=1400 audit(1576158856.264:18105): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.351193] audit: type=1400 audit(1576158856.264:18106): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.376805] audit: type=1400 audit(1576158856.264:18107): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.376824] audit: type=1400 audit(1576158856.264:18108): avc: denied { map } for pid=18474 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.443861] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.450350] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.457402] device bridge_slave_0 entered promiscuous mode [ 640.466399] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.473482] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.480766] device bridge_slave_1 entered promiscuous mode [ 640.500534] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 640.511310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 640.533521] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 640.540735] team0: Port device team_slave_0 added [ 640.547965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 640.555744] team0: Port device team_slave_1 added [ 640.563000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 640.573432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 640.642254] device hsr_slave_0 entered promiscuous mode [ 640.680461] device hsr_slave_1 entered promiscuous mode [ 640.722556] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 640.733606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 640.766139] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.772718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.779750] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.786135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.867689] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 640.874146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 640.889285] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 640.904696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 640.914739] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.921686] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.935718] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 640.942342] 8021q: adding VLAN 0 to HW filter on device team0 [ 640.957840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.965545] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.971933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.985907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.993693] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.000092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 641.027645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 641.037594] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 641.061510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 641.069047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 641.087633] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 641.098688] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 641.105642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 641.113883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 641.139097] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 641.149653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 641.158970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 641.165953] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 641.186036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 641.206025] audit: type=1400 audit(1576158857.264:18109): avc: denied { map } for pid=18475 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.950325] protocol 88fb is buggy, dev hsr_slave_0 [ 642.955603] protocol 88fb is buggy, dev hsr_slave_1 13:54:19 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\b\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:19 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="05000f00000000ff008d8018229c236cc462f1dede7b62fdd408941dfad61aa7a0c24bc6c1349407675cc5927af864bd7d9f36b191747aaf1455a32248aecf18a262c262992c89e03ca8d96601ca20c750a94692fabf5528c52289350b56f20cde436ac8b2b2b4d31746b33b863e4482cef64200a6654ebce39245fe8765dd4fdd113da7fbb85e5c9f55c7f89295a6090b5b9638c01baff996547d94d0"], 0x97, 0x1) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:19 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r2 = dup2(r0, r1) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@hci={0x1f, 0x0}, &(0x7f0000000240)=0x80) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000000)=[0x7011da50, 0x101, 0x9, 0x80000000, 0x100, 0x5eb, 0x101, 0xb7], 0x8, 0xffff, 0x0, 0x7, 0x153, 0x1, {0x4, 0x8, 0x3b, 0x400, 0x7fff, 0x9, 0x6, 0x8000, 0x7, 0x7ff, 0x101, 0x4, 0x2, 0x44e7, "f73414bea425430d4d168ee27e4cacbec377c420e5a0000000015667b6bf1bad"}}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000280)={@remote, r3}, 0x14) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) syz_emit_ethernet(0x4, &(0x7f0000003a00)=ANY=[@ANYRESOCT=r4, @ANYPTR=&(0x7f0000002780)=ANY=[@ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=r5, @ANYRES32=0x0, @ANYBLOB="9a572b44cfab4e9d89f0290c27de2233cc36791efed2aa24f64d2eb7ed4fac76349d44a3b8f5aca7fee0229e5be0a0e2362cfbac6af62d82081cfb18484e89c5ee2add9c6e141d1226b0ce10b1456899cd6e31b1ad3d10b2808be492026f0c25a2626b37edb7fc15e55adde78f00f27c21d730a423b31cf1c88207f0db7b9f08d6ba3909fed48b839c0d071d6cd04efd2ad2f55914e2c608a4eb2be7b8c1", @ANYRESOCT, @ANYRESOCT=r11], @ANYRES32, @ANYBLOB="600ed8c4fd9cbbd3ffd187769b69bd75e1d1e41ea50599f4637921574757a3108180f0c8dbaacaef790c7bc4dcc2076ada61c89d203b2d7df36e18baa04171840bd516d127b023697c287a1049fb7589ca6d19fa5f981125513629"], 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 13:54:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) 13:54:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40802, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000100)={r2, 0x14}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:54:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:19 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f00000000c0)) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) write$P9_RVERSION(r2, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0x2f4, 0x6, '9P2000'}, 0x13) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:19 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) geteuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r5 = dup2(r3, r4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f00000001c0)) setuid(r2) accept4$llc(r5, &(0x7f00000000c0), &(0x7f00000002c0)=0x10, 0x296819f027884410) sysfs$2(0x2, 0x10001, &(0x7f0000000080)=""/23) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'A\x06\xae\xc3iR3/'}, 0x2c, {'id\x00\x00\x00\xe3\xff', 0x3d, r2}, 0x2c, {'group_id'}}) r6 = semget(0x1, 0x3, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) semctl$GETZCNT(r6, 0x0, 0xf, &(0x7f0000000040)=""/27) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x2000) 13:54:20 executing program 4: r0 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000600)=""/4096) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = dup2(r1, r2) shutdown(r3, 0xa9a7460d66ba8c6f) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) semctl$GETVAL(r0, 0xf5d90d50e3c3bda4, 0xc, &(0x7f0000000000)=""/151) socket$caif_stream(0x25, 0x1, 0x3) syz_emit_ethernet(0xe0, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e800002a3d81471566c6fb841dd3b6b15e9bcfde9e74d608981d34add0d464082ec3bfb34b0ce65619e841e8883e94e09d010dbf93d932dddc96b084b87e63963c8ff4e39841f9dc4b49565090970badbe3c605a25c3ff11f574bc6a251054f60974ee8fcb7dff7502cd1bd45fbd8d3ee42c3ffdd18da237e4ec49089fea1e00457ebce8d0619bd79a6d4ab7b36d2710ba68e09000000d220170849e582238ed801ec06dcb316e5d041c54c801dbf9823d659b21eeb3edf557d36836a03b5473898849e13abf279dfc5f59fefc391"], 0x0) [ 644.390139] protocol 88fb is buggy, dev hsr_slave_0 [ 644.395309] protocol 88fb is buggy, dev hsr_slave_1 13:54:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x28) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8000, 0x0) mknodat(r1, &(0x7f0000000280)='./file0\x00', 0x100, 0x400) [ 644.630135] protocol 88fb is buggy, dev hsr_slave_0 [ 644.635314] protocol 88fb is buggy, dev hsr_slave_1 13:54:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r4, 0x0, 0x16, &(0x7f00000000c0)='/selinux/checkreqprot\x00'}, 0x30) readahead(r6, 0x4, 0x0) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r9 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r8, r9) setsockopt$bt_l2cap_L2CAP_CONNINFO(r8, 0x6, 0x2, &(0x7f0000000000)={0x6, 0x0, 0x1, 0x1}, 0x6) 13:54:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10802, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r4, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) 13:54:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000180)=0x8) 13:54:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:21 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa006f945408f37c69620845f5ee9027e7ae27cb6d2532d949316513d00c3af952038870bb70f6c4990fcc217032e3dc34b2aeaff03df506a10cd27246dc84aebda56e0f3221f9649ca4376466d6ed08713673444e997bf6bc7190df881f712914e75560e21cc8a20efa7e63954283eac274f62821cdbdf9dca8f2db0002bd5776636eac5adb789519754c579688a848e277d03324dadf8b58dabfb262c7eeed0163b905147fabc494c176b5304971f3d8cc34b3305178b8458f6d047855fb5eab0abacc23af24c7416c7a7b"], 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/deT\x01\xcc\xcb3!\t\x10Q\x1b\x00', 0xc082, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) [ 645.233882] kauditd_printk_skb: 159 callbacks suppressed [ 645.233892] audit: type=1400 audit(1576158861.294:18269): avc: denied { map } for pid=18539 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 645.398576] audit: type=1400 audit(1576158861.294:18270): avc: denied { map } for pid=18539 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ae00000046588d70e779323332027d87ad5908a1d096b9ff1d22d1fe469190083f22ce608bcc46913637043e23d389b067352e5c642dac5a1ccaa897630d3a89708ee77bfeb4bd9051499ae152fc8b8648bb0d9bb96b481f6f04aae9dcc5293528184aa7cf0d93af4a072b0a465b41aa83c6405ed8e3c149246593756587d37e6e6a77abc7586711e725424d75b949f6ff24e19cf9c07ef076239460594fd5df3740cd5739c2e272b0151307e4b60ed66e4e8fed000000000000fd62ea3204056491816440dad2a54324454b75741614f51c0055a10d401b50d2cfc57c8776502768"], &(0x7f0000000000)=0xb6) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:21 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x8000004) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x28) [ 645.658401] IPVS: Error connecting to the multicast addr [ 645.683032] audit: type=1400 audit(1576158861.334:18272): avc: denied { map } for pid=18541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x1c00, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000080)={0x20, 0x0, 0x6, {0x0, 0x72b906880bb281ba}}, 0x20) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="c357f769f34cb19fd69ff4e8f8a56644ec4253218b838fcc916d6fddf60b4083e135c70980b735b84859afcc2b7fa539be44974a4ad6f61a4ea3e0d278a2dd7b18dd6c941ee96cca752487c501865815aee9a2742e2f1ea3fd1595049636c15761746b1b9b", 0x65, 0x24046858, &(0x7f0000000140)={0xa, 0x4e20, 0x80f, @empty, 0xffffffff}, 0x1c) [ 645.823556] audit: type=1400 audit(1576158861.334:18273): avc: denied { map } for pid=18541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) [ 646.109245] audit: type=1400 audit(1576158861.294:18271): avc: denied { map } for pid=18539 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:22 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaae2b31dec2e80886394a7908455251c7afbb19602e516"], 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01e20000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r2}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r2, 0xa24, 0x34, "727fb2d05cdc3d63c3f059dd9fd630e621e5943ef14f7f5864ed13162ec2da2ed1b9968e553482018ac77ad1cbd78e232491cb27"}, 0x3c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 646.310178] protocol 88fb is buggy, dev hsr_slave_0 [ 646.315369] protocol 88fb is buggy, dev hsr_slave_1 [ 646.326976] audit: type=1400 audit(1576158861.344:18274): avc: denied { map } for pid=18539 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 646.470152] protocol 88fb is buggy, dev hsr_slave_0 [ 646.475326] protocol 88fb is buggy, dev hsr_slave_1 [ 646.512407] audit: type=1400 audit(1576158861.364:18275): avc: denied { map } for pid=18541 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') prctl$PR_SET_FP_MODE(0x2d, 0x2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) setsockopt(r3, 0x9, 0x3ff, &(0x7f0000000080)="159d625421616ce80481ed84c204c6aafaf476417afd0e5d3030959f9c69813e01ce7021dac2b46c9b47f1a2698593ccc409cb2f2803a6300233a4c18727fcd05d09e0e49829a3ae", 0xffffffffffffffba) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:22 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d6d5819b98e31a6e0090a24851b6acb0654b567aea8df9961fc3264cce028ece014e4dccbf1d599b0f5d9d2ecd534a61704fec970bc76b0fff53bbb0ec0904ae336551874f2a25aabf9a487098ba90e58506696c6d33df014363ffbd582e025", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 646.707436] audit: audit_backlog=65 > audit_backlog_limit=64 [ 646.719132] audit: audit_backlog=66 > audit_backlog_limit=64 [ 646.738394] audit: audit_backlog=66 > audit_backlog_limit=64 13:54:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) recvmmsg(r0, &(0x7f00000001c0)=[{{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000400)=""/196, 0xc4}, 0x3}], 0x1, 0x40, 0x0) 13:54:23 executing program 4: syz_emit_ethernet(0xe5, &(0x7f0000000180)={@local, @random="fae27ed500", [], {@generic={0x8137, "00c8f77adefe96d7c40231c42b3854669046f411f28c4aa6167d149c5d0af29f6bab0407c26636da965398023e4b9403d165517371d0f95d54c83c5e71942036682fbe3fc2975e3b2eeddf6159cefef7e6dcc018a75cb53ac70bbb4b7b505ff54410193e785097edc855425ca229d0e2abcd047d82294b9d420a26155b8fecbe64c5d8d3cfe398b605043c5a46526d9f6ad6aa70668d6cc39ef3158e51f6ce03927206426bb948c4e6f77208013f386c96dd8e8e6bd5fcd9e5e7b9b6c3dceed58f1ab91653b76d2d427f1656191f0b12bdbf4f626d3a4b"}}}, 0x0) 13:54:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x2, r3, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200) ioctl$LOOP_SET_FD(r4, 0x4c00, r1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:23 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c1a"]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x21dc939e3af9f034, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:23 executing program 4: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e80886394a7030000e8031fb7cc557e2768ab00b8781a9c99e1e20e906b569f324b544cb2e67557c204a96d77271341be665c13821521a20a172557dac341b5810f1d38eeb9"], 0x0) [ 647.990128] net_ratelimit: 2 callbacks suppressed [ 647.990135] protocol 88fb is buggy, dev hsr_slave_0 [ 648.000192] protocol 88fb is buggy, dev hsr_slave_1 13:54:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syncfs(r3) 13:54:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x10001, 0x6, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x20100, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:24 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000005580)='/dev/bsg\x00', 0x6a1b0f70efca06d4, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000055c0)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) [ 649.190177] protocol 88fb is buggy, dev hsr_slave_0 [ 649.195356] protocol 88fb is buggy, dev hsr_slave_1 13:54:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x288803, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:25 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) ustat(0x9, &(0x7f0000000040)) 13:54:25 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f00000000c0)={r2}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000600)={r2, 0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000000)={r2, 0x3}) syz_emit_ethernet(0x9a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaabbe8c2b31dec2e80001104aafd01421bfd6eb08e42efc22942040e2331fdcfb07c6a154c2a5e400242dd872292738350a3c8ca02014c47995768db109596bf29d9929ee2d5f81872537eb44e74a641030d1a37be75cfe52fb523c08612acefef1f8a4e3e38fe2edeff7f11d0670cdd5db9a553cae9d9219c1cd54bf3200c6db8d99e165b6fbb3071bed254a4fbeaa3a0cb67dd67b1"], 0x0) 13:54:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f0000000000)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) read$fb(r3, &(0x7f0000000300)=""/210, 0xd2) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x9000, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="00032abd7000fd4bdd0d2d1ce2b5c08024e3396ca7f5ea03f41f30c200"], 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0) 13:54:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='-dev/ashmem\x00', 0x91581, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x400e41, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:26 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x80000) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x44) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', r4}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000380)={'vcan0\x00', r4}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x147b02, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x158f6b26eda6457c, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r8}}, 0x18) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4002004) syz_emit_ethernet(0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e80886394a7030000e874ab1fb7d506e62e01d5ff5592149233e9cb313ba87251dab6a0c96eebf18320d90100bcdbc3244ef05c5cb79b42e3592a44f95ca6698e15dc0429b778b27ce8f26a2d2bad7327ae718e0eee4638d85d57dedf7b7513d9dfb6a18532e1e5822f229ee7c94e6a26fc553e52e97fc8be26519a800c9c5f4d66384e33ba9b0af757d3a31911fb6ba619bcb77b2d"], 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) r13 = socket$caif_seqpacket(0x25, 0x5, 0x5) r14 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r15 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r14, r15) r16 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r17 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r16, r17) r18 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r19 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r18, r19) r20 = dup2(r17, r18) r21 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r22 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r21, r22) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000500)="9e34f567797682fbcaf329e8a07aa2dd99ef08638b246a09dd980df43c89b2850f776867a7a451defe64defdd7cefff67f8372808b93606a02fad5688aaf2fb59085cfb4c1cae9a84224e38be65d843acea96b6a0bb0c9b7a164aad5bd3fe94e312e7e6649d70a03c12986c0e4", 0x6d}, {&(0x7f0000000580)="8d98420336b9ee362c81ec2e5e8f5ab68990154731837c0298350a0a72e01e890bf8eba82f97eddce3eb55ca616a3ac01fdae5d26906818e2cc609a37db878883cee9f12551a75bb330170e7605bc19a9ee72f15186946d17263bb87af6ebbef881cd328cdcd04d917c0b8c9b1cb5de6c1fe365a3bf77620f69aee01572518bc4c460f0f4e7ac00bc73f2f329bc42ffbcee865486b22db36b17c0e4927513ae9e1f2e3f476a571e44e3537b5427fa1ad2fd2e5e9e9a5fd5f5b1dda234918c130ed10879f", 0xc4}, {&(0x7f0000000680)="c56dc43f86c23713fe2d0768337a5e22d06d8cebff11cdca4ea62d0ee4a2d90437a6628859312f3f45250f7771f0a62c5bcbf2e8ae0ae34bfbc0df0ea66a790b3ce7cd56646b1a1fd1750e9177221a46b505b3dfaf86c7396a070b5741304d9f6316de6186ed2bd2dec0001748338201e5a6f36e6a56896569d36e9c90955e0334b3bd1e70726305a461ac24eed07b4148dd8511662f59fa67254f9f6112450e6a39d6d91845f20db2012fd42a345d0aae12a11e22b1877ee34bce835517349fafcdcea34c8b03657dc39d96600e81ed1d6892b6512c", 0xd6}, {&(0x7f0000000780)="a018e91550763bc185a688ccfc9a5c6f5e1d6425f6018a817878d8a37ee4c933a62045d9dd4bca5b3f11586ebac2f3228d08fe5333d7fd830e973b9918b979cdb26bf9bc0d89", 0x46}], 0x4, &(0x7f0000000800)=[@rights={{0x30, 0x1, 0x1, [r9, r12, r7, r1, r13, r14, r20, r21]}}], 0x30, 0x40000}, 0x20000000) 13:54:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:54:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f0000000100)="080545ec5dd1b7579c6cf65ec12188fcb3d28892132e6c70ef4a1ea3b9bd44f1b404bfb09d8a2f16eece1f6eebd2a2fc2dd642ac9de16597de62acf5f699ab1bfa4e6b2d12c3612eb7289d2048dcf3c40d85ca92716a3de51e9aabcd6ba79f767bc89726c7b40f55e672a19103d80422d06f3176631774f6116da9ccda45d73d9e25d90e2f", 0x85) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 650.244108] kauditd_printk_skb: 255 callbacks suppressed [ 650.244118] audit: type=1400 audit(1576158866.304:18525): avc: denied { map } for pid=18676 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:26 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8c00, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) [ 650.497475] audit: type=1400 audit(1576158866.304:18526): avc: denied { map } for pid=18678 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') [ 650.677035] audit: type=1400 audit(1576158866.304:18527): avc: denied { map } for pid=18678 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 650.870132] protocol 88fb is buggy, dev hsr_slave_0 [ 650.875304] protocol 88fb is buggy, dev hsr_slave_1 [ 650.945965] audit: type=1400 audit(1576158866.354:18528): avc: denied { map } for pid=18676 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:27 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) syz_emit_ethernet(0x25f, &(0x7f0000000580)={@dev={[], 0x2b}, @random="c2b31dec2e80", [], {@mpls_mc={0x8848, {[], @ipv4={{0x52, 0x4, 0x0, 0x0, 0x24d, 0x64, 0xff, 0x2e, 0x62, 0x0, @multicast2, @broadcast, {[@timestamp={0x44, 0x30, 0x80, 0x0, 0x3, [{[@remote], 0x200}, {[@loopback], 0x200}, {[@multicast1], 0x3}, {[], 0x1}, {[@broadcast], 0x8}, {[], 0x7}, {[], 0x8000}]}, @cipso={0x86, 0x1b, 0x4}, @cipso={0x86, 0x7f, 0x2, [{0x1, 0x12, "0b50789e6c13ba0b686b1cc01252552d"}, {0x0, 0xe, "87900000000300"/16}, {0x1, 0xd, "7d6ffb56c5b320c1ea4da0"}, {0x6, 0x9, "66ee55958fc026"}, {0x8, 0xb, "0a3aa3f755cc445f66"}, {0xf, 0xa, "e7da8d03d41191af"}, {0x6, 0xf, "ce8bd1e9861ee9c60fd83142c2"}, {0xc, 0xa, "1137247e1d59f15b"}, {0x7, 0x8, "b815c6392740"}, {0x7, 0xd, "2bcc95ad9aed505c8b8024"}]}, @cipso={0x86, 0x3a, 0x8, [{0x1, 0x9, "0e652c10d2db68"}, {0x84e92ab2525f4db8, 0xfffffffffffffdfb, "0f43aa59bbc9583f7e7c"}, {0x5, 0x11, "6d7a80948ff259708a3a7f1171f35e"}, {0x7, 0xb, "146cc69518ed193dfe"}, {0x5, 0x3, '7'}]}, @cipso={0x86, 0x30, 0x8, [{0x2, 0x3, "8a"}, {0x0, 0x3, "c9"}, {0x2, 0x11, "624dbe7467cea4c8f4f2d0f5543c58"}, {0x6, 0x7, "95e4ae9d89"}, {0x1, 0xfffffffffffffeed, "3ee0c799ed4ad0e1f326"}]}]}}, @dccp={{0x4e21, 0x4e20, 0x4, 0x1, 0x3, 0x0, 0x0, 0x1, 0x2, "67bf1b", 0x40, "95379d"}, "e2530da52d774c1f1c9e87a2da81f1e0ef46ff334476cea514d9aec3ccf47cccd1e9596e4c9faa2c510a26e1b969e38c578159bab242bb9c971b281f123f5d7d69823d5deb72423d50ceef437e859008469335e50a1d27eb8b448a85df8db8f697a25c2c9512c09953a6dca04629217a0761928d7d343c66f363608bdcd8edd2ca7ed859a745838a6d64f9decc1414b54301331f7febec2cc8c48696e8f187567eaae632bff29754162dc4de349023a374659ae32fd06235f6f4be928b08ab8e93b03f0ff62b0d84b0a814be84ed08dfcc1e4730a955cd5a15820d125ef6ad7e1049e90f5f8869e613878985f4eb578673a02002c1"}}}}}}, 0x0) 13:54:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x10, &(0x7f0000000000), 0x20a1562f) [ 651.193236] audit: type=1400 audit(1576158866.424:18529): avc: denied { map } for pid=18676 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 651.270174] protocol 88fb is buggy, dev hsr_slave_0 [ 651.275309] protocol 88fb is buggy, dev hsr_slave_1 13:54:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x1, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x7e, 0x0, 0xffffffffffffff2b) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 651.457018] audit: type=1400 audit(1576158866.434:18530): avc: denied { map } for pid=18676 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, 0x0, &(0x7f0000000040)=0xff62) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffbfffe) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) getsockopt$inet_int(r2, 0x0, 0x22, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/181) [ 651.666625] audit: type=1400 audit(1576158866.434:18531): avc: denied { map } for pid=18687 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:27 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x40, 0x2001) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="030000004eacac5d07dae655ace9f30d465b99d342d22ce5e8eda0f20351b009f0652583f7496acf785f703423fa7da86b80891fc1f8b9399a4b1be073d48d3c5b19633dda781a5a1e439af5098bf5", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r2}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={r2, 0x5, 0x0, 0x0, 0x2}, &(0x7f00000000c0)=0x18) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2800000004000000000000000000000001000000000000000000f900"/40], 0x28) 13:54:27 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/w\x05\x00\x00\x00ux/mls\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x10000, 0x7, 0xffff0001, 0x7ff, 0x15, 0x7, 0x0, 0x54, 0x2, 0x2, 0xffffffe1, 0x8}) [ 651.761307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 651.793075] audit: audit_backlog=65 > audit_backlog_limit=64 [ 651.814621] audit: audit_lost=238 audit_rate_limit=0 audit_backlog_limit=64 13:54:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) socket(0x18, 0x0, 0x0) 13:54:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x109000, 0x0) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x303}, "4f492a1999af93d6", "87f830718c2c1f65289ad85f527cd8a0", "5434a883", "00758571d4082081"}, 0x28) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r4, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:28 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000000c0)=""/236, &(0x7f00000001c0)=0xec) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x90800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x92800, 0x0) 13:54:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 13:54:28 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f00000001c0)={0x28, 0x0, 0x4, {{0x6, 0xe3f, 0x0, r3}}}, 0x28) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:29 executing program 4: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvme-fabrics\x00', 0xda24fb797393de8c, 0x0) fcntl$getflags(r0, 0x401) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r3 = dup2(r1, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000100)={{0xa5bf43bf6a15d548, 0x0, @identifier="e12f88cdad5ad137537f83af5a35987d"}, 0xe7, [], "eea9f70d21c34d7ca562636c3ab93b51e2261b2206c42aa1f593b9758e5e58dba0997d2808d15c18fe6c8d8c071f164b0e356a991e0f0ca4a9af6fbe4365c66dbcb023b914d0829c341769d58cd06bc9b50bc18778ed4dcaafefd60434167d5c287af6f17448531bc734ef7285ad674ad552468e29a6614381e3c8990b5e7acb1889484a272dc764f4eec9ca9f991bb0ec88710dd403c304e73b3e80abc0148cc03269c0f98dfccd2aa9b7de36b361bb719a96eb4289ff9e2af4c2896bf5a4734d8282de98134605cc0759667df38dc6ee2014d4b84342a8e632dbc2e206ec1023fb466e160ec6"}) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) dup2(r2, 0xffffffffffffffff) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000002440)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=r3, @ANYRESDEC=r0, @ANYBLOB="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", @ANYRESHEX=r4, @ANYRESHEX, @ANYRESDEC]], 0x0) 13:54:29 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_dccp_int(r4, 0x21, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x1, 0xe64}, 0xc) 13:54:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) socket$kcm(0x10, 0x3, 0x0) 13:54:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x4}}, 0x28) 13:54:30 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 13:54:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) dup2(r1, r3) mq_getsetattr(r1, &(0x7f0000000040)={0x40, 0x3, 0x0, 0x80, 0x9, 0x3, 0x8, 0x1000}, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x2000007, 0x12, r0, 0x0) 13:54:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) [ 654.360387] device bridge_slave_1 left promiscuous mode [ 654.367223] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.496498] device bridge_slave_0 left promiscuous mode [ 654.503448] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.115098] device hsr_slave_1 left promiscuous mode [ 655.175404] device hsr_slave_0 left promiscuous mode [ 655.248326] team0 (unregistering): Port device team_slave_1 removed [ 655.261789] kauditd_printk_skb: 211 callbacks suppressed [ 655.261798] audit: type=1400 audit(1576158871.324:18740): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.353271] team0 (unregistering): Port device team_slave_0 removed [ 655.407501] audit: type=1400 audit(1576158871.354:18741): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.440770] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 655.502401] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 655.514631] audit: type=1400 audit(1576158871.384:18742): avc: denied { map } for pid=18813 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.620190] audit: type=1400 audit(1576158871.424:18743): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.683471] bond0 (unregistering): Released all slaves [ 655.693598] audit: type=1400 audit(1576158871.434:18744): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.738702] audit: type=1400 audit(1576158871.454:18745): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.780737] audit: type=1400 audit(1576158871.464:18746): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.804875] audit: type=1400 audit(1576158871.524:18747): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.804932] audit: type=1400 audit(1576158871.524:18748): avc: denied { map } for pid=18813 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.868999] audit: type=1400 audit(1576158871.554:18749): avc: denied { map } for pid=18814 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 657.550989] IPVS: ftp: loaded support on port[0] = 21 [ 658.396043] chnl_net:caif_netlink_parms(): no params data found [ 658.473701] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.480277] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.487242] device bridge_slave_0 entered promiscuous mode [ 658.496673] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.503549] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.511732] device bridge_slave_1 entered promiscuous mode [ 658.533989] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 658.545660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 658.569039] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 658.577150] team0: Port device team_slave_0 added [ 658.584930] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 658.592344] team0: Port device team_slave_1 added [ 658.599844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 658.609726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 658.674579] device hsr_slave_0 entered promiscuous mode [ 658.720438] device hsr_slave_1 entered promiscuous mode [ 658.782985] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 658.793577] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 658.823183] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.829646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.836305] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.842741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.928342] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 658.935212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 658.952082] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 658.967323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.976735] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.983694] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.998730] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 659.005787] 8021q: adding VLAN 0 to HW filter on device team0 [ 659.020957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.028593] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.034996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.048849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.056731] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.063123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.094083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 659.105418] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 659.121418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 659.135657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.150994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.163159] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 659.169197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 659.196906] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 659.208554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 659.216791] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 659.238537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 659.380665] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 660.759018] kauditd_printk_skb: 123 callbacks suppressed [ 660.759028] audit: type=1400 audit(1576158876.814:18873): avc: denied { map } for pid=18829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.787443] audit: type=1400 audit(1576158876.814:18874): avc: denied { map } for pid=18829 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.813831] audit: type=1400 audit(1576158876.824:18875): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.838643] audit: type=1400 audit(1576158876.824:18876): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.863991] audit: type=1400 audit(1576158876.834:18877): avc: denied { map } for pid=18829 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.888703] audit: type=1400 audit(1576158876.834:18878): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.916664] audit: type=1400 audit(1576158876.834:18879): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.941946] audit: type=1400 audit(1576158876.844:18880): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.973167] audit: type=1400 audit(1576158876.844:18881): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 660.998196] audit: type=1400 audit(1576158876.854:18882): avc: denied { map } for pid=18829 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 661.030144] protocol 88fb is buggy, dev hsr_slave_0 [ 661.035233] protocol 88fb is buggy, dev hsr_slave_1 [ 661.280134] protocol 88fb is buggy, dev hsr_slave_0 [ 661.285259] protocol 88fb is buggy, dev hsr_slave_1 13:54:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x8, 0x0, 0xcb) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:37 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40200, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) r9 = memfd_create(&(0x7f0000000500)='group_id', 0x1) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r11 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r10, r11) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r13 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r12, r13) r14 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r15 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r14, r15) r16 = gettid() ptrace$setopts(0x4206, r16, 0x0, 0x0) tkill(r16, 0x3c) ptrace$cont(0x18, r16, 0x0, 0x0) ptrace$setregs(0xd, r16, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r16, 0x0, 0x0) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r18) sendmsg$unix(r6, &(0x7f00000005c0)={&(0x7f0000000080)=@file={0x6832744915addd74, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="9abc52d105c8320bf915ad33bbddd0498934c1d4a3e832ff7feaa83816e0f80af975447f0293f62c50c6950d5f9658f1959dbb23bcb35ef092b4a166f919d9e2a61090b4dda949c37750d70cb3468ad42f107340e759b8ff3fb5a80fc47f4a7ec0717c19919f7b1d019b47c2459bdc284d0963034019d2789e27c17e0c04a669b4e4797cebcb733a2cafc1b8cfd4c2953f050ab1183a4020a77c7e91d0af5a94b2ab6b3a518ce126a72cd22ac6", 0xad}, {&(0x7f00000002c0)="a700446fb46b6ffe9bcdf51d30d75710ea266b6d0de3802a7789b2c31a262d4626fa9a14940d017622715839cd4a199a84d9d7897e43a77d490205df88b11096ba77b23063d8531ffcb8cc71adc2256366b2df53fea1493a67bfb2e1bd8d1529a3c17428d3398d259a5b70bce039649a26fc5e784b55b63d4383543e29cbbb1691bdc92dada8c6dab864faa54d0c436cec824e4e31bb2dfef4a87cd41671509b168add9284156638de2c7db89c31d24e910ee9c11eb7754df10c5fe86bf73af10f08", 0xc2}], 0x2, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [r8]}}, @rights={{0x30, 0x1, 0x1, [r9, r1, r1, r11, r12, r14, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r16, r18, r5}}}], 0x68, 0x440}, 0x4000010) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x800000, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r19}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x43940dce1f901cc1}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x4}}], [{@fowner_gt={'fowner>', r2}}, {@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', r4}}]}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:37 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000701000/0xf000)=nil, 0xf000}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) semget(0x1, 0x1, 0x440) 13:54:37 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x400}], 0x1, 0x507) dup2(r0, r1) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:54:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, 0x0) 13:54:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:37 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r4, 0x0) sendmmsg$unix(r2, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20}], 0x1, 0x0) setfsgid(r4) r5 = dup(0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r7, 0xeb26ad8eac5a8a19}, 0x1c}}, 0x0) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f00000002c0)=0x4, 0x4) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000128bd7000fcdbdf250100000000aac993370210e69ac948a5321b00000009410000001800180000000c69623a6e657464657673696db9000000"], 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x800) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0xffe00000, 0x1a, 0x4, 0x1, 0x9}, 0x14) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x6) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r9, 0x8983, &(0x7f00000003c0)={0x0, 'ip6tnl0\x00', {0x3}, 0x81}) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x80, 0xffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d67279cb2d869c305e004c1762602c6acf1b1ea9762eac1421dfadbfb4d6f77baa288c01b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6772bec36f05c10000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) ioctl$VT_RELDISP(r1, 0x5605) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2800000004000000000000000000000001000000000000000000e80e00"/40], 0x28) 13:54:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xd5e3f16b8cd9965a, 0x22, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:38 executing program 4: syz_emit_ethernet(0xfffffe59, &(0x7f0000000080)={@local, @random="c2b31fec2e80", [], {@generic={0x3, "ed6d893879661e0255f62ab79180ed1451599c541553eb426c846d4cbf6814627d651c2f52d7739962b179afbc83355b9059626576dee6021de3784d71793222a8dbee97e2d8a433cd7fc2ac1f6b91c0f1a2c221fb6e91f9c62e22302de3fb9ca2b007a9e61e1a42430b0383b4fa8624117a2a0f63e0292d430f4cb0fe6c02c5c7f9ccdba68a72d6159bbc4c893416b96bc5d8d898871063ff"}}}, 0x0) 13:54:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:39 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') munlockall() mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:39 executing program 4: io_setup(0x5, &(0x7f0000000000)) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="9a94d6ccbef28656e55df6d49c040ae495941e1ded07292dac19b18dbca114bea76bb932c9d11b7fdd9253245fe8ca8d59e2f12628d01e8c73b1666a"]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xa3, 0xac, &(0x7f0000000040)="9c0b5ff0a44cbce354cc946c3876b7a4c79b9071c021af203356952c9d3988bd413dc92b90be1f309644928a55b5e11876923a095896ce21c381d22a26386c0dcaf30d4c4f82feeabf60d9f80b9a15f7d9a377085077bce54813f2232f25eba5ec7fb9b4ae9f6d2b37213f23e5719e1f92e9ca1582883df6a71593d493de21777c55ef43921da511891e9bffed659d7d05fc4247d09c8883ca181576d01940ca1a2da3", &(0x7f00000001c0)=""/172, 0x1, 0x0, 0x50, 0x97, &(0x7f0000000280)="5ad3beb0c9c3b1a9cb754415529bae62fef5032cd94271d6e6b8887f7b58c4e3fca21efd91547b6c5236992200c3aa721afd40ab009e2c260b53fb66f90d0cae5c6a5b75a048392eb272fc2fbe4ba8024226b59f6d229cf01f04fdb413c298299b3e3bedcebad03369a603985d5fc14608dc4cc1f97740cba99dd04d98c8340c46fd0b5592aabea3f7bc9c92be46d4062af21b9bf62578128a98ea9a7e564dde73d78f34e5287136a20119c88a9c264c661df904ad5ccb5808f9568485ef8219567c69a28ea10ab1eae998ffc8cfaa06b117c6a8e7cd9102fcc9f2de3c4390f8e2b15b46965ad468ed27336666fc5212f1c43d", &(0x7f0000000380)="558c31508798d978772aba54bc4d2bd293badccbcd966ab1b54941d47e79f39c13946dc58337d2c824150b782ca859ee68eff9e7be1b28ac8f8e3b9fe046c5bce8ff49f9431f04beae74cbebe0a482934300d65fa0a9cb8b99ab6ce8a6de9309e560d149b74e73ec9aa546eed5413ca5d64b8b70c36182e4bd1dde4f8b428ad7dfba41a891708f0d3448fc347472d53605672842824222"}, 0x40) 13:54:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) [ 663.611220] device bridge_slave_1 left promiscuous mode [ 663.616894] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.745519] device bridge_slave_0 left promiscuous mode [ 663.751430] bridge0: port 1(bridge_slave_0) entered disabled state 13:54:39 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x19d480, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = accept4$inet(r1, 0x0, &(0x7f0000000040), 0x400) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast1}, &(0x7f00000000c0)=0xc) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = openat$cgroup_ro(r6, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_udp_int(r8, 0x11, 0xaeafdfe03baf4df7, &(0x7f0000000180)=0x20, 0x4) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) unlink(&(0x7f00000001c0)='./file0\x00') [ 664.391068] device hsr_slave_1 left promiscuous mode [ 664.457989] device hsr_slave_0 left promiscuous mode [ 664.585278] team0 (unregistering): Port device team_slave_1 removed [ 664.655522] team0 (unregistering): Port device team_slave_0 removed [ 664.773043] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 664.917443] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 665.036416] bond0 (unregistering): Released all slaves [ 665.895810] kauditd_printk_skb: 160 callbacks suppressed [ 665.895821] audit: type=1400 audit(1576158881.954:19043): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 665.931558] audit: type=1400 audit(1576158881.954:19044): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 665.964452] audit: type=1400 audit(1576158881.974:19045): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/root/syzkaller-shm328408150" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 665.991202] audit: type=1400 audit(1576158881.974:19046): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/root/syzkaller-shm835719101" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 666.019813] audit: type=1400 audit(1576158882.004:19047): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.045901] audit: type=1400 audit(1576158882.004:19048): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.076748] audit: type=1400 audit(1576158882.024:19049): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.103471] audit: type=1400 audit(1576158882.024:19050): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.134286] audit: type=1400 audit(1576158882.024:19051): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.160198] audit: type=1400 audit(1576158882.024:19052): avc: denied { map } for pid=18910 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1124 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 666.791549] IPVS: ftp: loaded support on port[0] = 21 [ 667.659724] chnl_net:caif_netlink_parms(): no params data found [ 667.729941] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.736471] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.743910] device bridge_slave_0 entered promiscuous mode [ 667.752571] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.758959] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.766356] device bridge_slave_1 entered promiscuous mode [ 667.786888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 667.797910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 667.818007] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 667.825383] team0: Port device team_slave_0 added [ 667.832684] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 667.839725] team0: Port device team_slave_1 added [ 667.847404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 667.856538] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 667.913702] device hsr_slave_0 entered promiscuous mode [ 667.960369] device hsr_slave_1 entered promiscuous mode [ 668.012905] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 668.023148] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 668.052026] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.058398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.065044] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.071533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.160432] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 668.166569] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.181501] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 668.196373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.204068] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.211021] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.224230] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 668.230501] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.245374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.255180] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.261610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.275108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.282956] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.289304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.317323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 668.333465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 668.341194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 668.360517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.369277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.383114] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 668.389192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 668.415135] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 668.425710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 668.436920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 668.456541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 668.640534] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 13:54:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000000)={0x100000, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:54:46 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) 13:54:46 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) r13 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r14 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r13, r14) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x62022, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB="4b3d3374f0c69e9b1d8a0e16fe197e02cfdd12916b1cbf07cbbe7f94483dae084d34d50b1a65c342aadb5a9f3eb492c98bdc6d056eacc971d7d8093a8cb969a9b875de99bed50f669dd3aca5491b71e331e0db0cc2bcf0f3e9bad21cc0c8fda48d0cb6d82076584e31d20e365b12c7f2749eec9d74a3c22f18ec48d5035aa04412d87e058e2a33fad050e1af4b3926e16208550134705bce7407e9da24788a5f8e5a9e22cecfd3360b09ea4d7585922cb9914cca3008ed38796ba78eb517d5bb8e1a341e4bdef666aec079683912edc2a115113c12080d1a99cfa7c7e4596b1df21e25d54992e472ad6b78fc8f", @ANYRESDEC=r0, @ANYRES64=r2, @ANYRES64=r0, @ANYRES32=r3, @ANYRES16, @ANYRES16=r8, @ANYRES64=r9, @ANYRES16], @ANYPTR=&(0x7f0000000500)=ANY=[@ANYPTR64, @ANYRES16=0x0, @ANYPTR, @ANYRES16=r0, @ANYBLOB="8d7fde61b9bbd0af27b4efee65627a3166ce4b29d4662b174afe9d6a5e75d4438815e19dc0a9cea979c0d1e017176338d854186fc4ccaf6acb29da22ff1b89c4169ed60446c73341b4452b198f01b6b72c4d0e645dc645449a32970a37b8b40f5a2d16fbfbd814d1b7344ea7b15b932291d46ce6d31c18078be6958cf89a6523fcdc5df906f8a609c2bdd502a2219c2a6f88502553"], @ANYRES32, @ANYRESDEC, @ANYRES16=r14], @ANYRESDEC=0x0, @ANYBLOB="2c081dd27ef37f2b9970", @ANYRESDEC=0x0, @ANYBLOB="8ba73fb946c7bac0fd4c1c96054431f0dbcb91333a7f4e453ce07511015d10bbb78fe481fa51b8c2fc851ce8981d50a82f96bcea7dec767ea49729d7f786e971f7c7497904425564093564f51eb3447950ccde0cd5e9c68ad777c5754ebed4baac6950522a5d29856dad3e24665a4f520466837e5a04b0c0bab80b"]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000004000000000000000000001001005667d7e600"/44], 0x28) 13:54:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dm\x00', 0x8c001, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f00000001c0)={{0x1}, 0x8, 0x8, 0x2}) r5 = dup2(r1, r2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f00000002c0)={'bcsh0\x00', 0x2}) recvmsg$can_bcm(r5, &(0x7f0000000b00)={&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000940)=[{&(0x7f0000000440)=""/212, 0xd4}, {&(0x7f0000000540)=""/214, 0xd6}, {&(0x7f0000000640)=""/78, 0x4e}, {&(0x7f0000000240)=""/14, 0xe}, {&(0x7f00000006c0)=""/196, 0xc4}, {&(0x7f00000007c0)=""/47, 0x2f}, {&(0x7f0000000800)=""/69, 0x45}, {&(0x7f0000000880)=""/60, 0x3c}, {&(0x7f00000008c0)=""/42, 0x2a}, {&(0x7f0000000900)=""/39, 0x27}], 0xa, &(0x7f0000000a00)=""/233, 0xe9}, 0x2000) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000040)=""/54) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000140)={0x2, 0x0, [0xffffffffffffff01, 0x3ff, 0x1f, 0x4, 0x4, 0x461b, 0xa53c, 0x60b]}) 13:54:47 executing program 4: syz_emit_ethernet(0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e80886394a7030000e8d518fd8e7674b20361d4bfa49a140a6ad57c3eec0c71b9cce95f7edec97c4ef298aa5fb7677859fce8d70673b23ede99d346520c2b43"], 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x1000, 0x4) 13:54:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:47 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x212100) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/16) 13:54:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:47 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000240)=0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = accept$nfc_llcp(r6, &(0x7f00000000c0), &(0x7f0000000000)=0x60) readv(r8, &(0x7f0000001a00)=[{&(0x7f0000000140)=""/154, 0x9a}, {&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f0000000380)=""/232, 0xe8}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/159, 0x9f}, {&(0x7f0000000600)=""/232, 0xe8}, {&(0x7f0000000700)=""/252, 0xfc}, {&(0x7f0000000800)=""/247, 0xf7}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/210, 0xd2}], 0xa) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) syz_kvm_setup_cpu$x86(r9, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:54:47 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) bind$ax25(r0, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c956f6f746d6f64653d3030303030303030303030303030347b66d5857df32030473130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 671.458893] kauditd_printk_skb: 103 callbacks suppressed [ 671.458901] audit: type=1400 audit(1576158887.514:19156): avc: denied { map } for pid=18948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 671.606651] audit: type=1400 audit(1576158887.544:19157): avc: denied { map } for pid=18948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:47 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:47 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) getsockname$packet(r1, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000017c0)=0x14) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x8, @mcast2, 0x5}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000140)="7f0145f8b5f3ae11ab207178932093a4f4373032bce00ed348ac10a5872b088704999ed250a8666fec7215d37bf015466f13cc650cf1919776749a4642d0345dafce4ca0f834d51b5343774b77c721cf0db9cc49a645ceb3b3038e5ddbf4b5a676e1c5cc98a8709fbac006605fc389776dd030ab9e7f52a7551a86f21979b8816cd7509d4e43991669eb6601813c6b0b2dbbb54a9541566f79bf8815db3e769dd990a36db09703a5bf60074638159c188fb813baafe7d4ad9bbca5c531d985", 0xbf}], 0x1, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], 0x268}}, {{&(0x7f00000004c0)={0xa, 0x4e21, 0xe, @rand_addr="9a94d2d16a9451fee59d47e8aef2635a", 0xdfac}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000000500)="e2596b8ff3dbbbcf04f1908adba2d24436c8", 0x12}, {&(0x7f0000000540)="35efde6ae90ba44835dcf2cd29779d4ccafcc54b68cfb7e3756c8444d5b6f5068e6dde75e3d41b3641698e51ecbc4e9b6c35552fa56176a8bc9dcc00781d97a608fcc83bfd82778be829375afc8d55b1d0ac315a83d7ca9db0c9feff8535acda64b33c1fb46ccdb1c8c844b2d0bafde9b9742a3ef9cb4532ff", 0x79}, {&(0x7f00000005c0)="a35fa00bfb14fcaabe7e72f8563aa291916ecdb814ef43928d35c0347596e1cac4fe02531df2b44ca3e4b74fe6cdb9f7e822a8f79dfbbcfd090597f683e49a6057bd2384da84170c2dbf346900", 0x4d}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="42b5dc2b6806aa2ee50d7b9d405e0e751e8527865a78a6e90415796c1f8bcfcb1ab4136bdd1c3c9b69810f9000524cfcc35ef557", 0x34}, {&(0x7f0000001680)="31dfc84da83b5d60be47148b091609b002da92240fb0969c27010439475bfa008822caa534a34403541b5a1291a963724d7d537e5c74985f436cba76c5589f20b4527a955bcdc017f7b9d99ec54b48c33cedacde3ca9", 0x56}], 0x6, &(0x7f0000001800)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7fffffff}}, @hopopts={{0x118, 0x29, 0x36, {0x4, 0x1f, [], [@calipso={0x7, 0x40, {0x10000, 0xe, 0x0, 0xfff, [0x8, 0xfffffffffffffffd, 0x208, 0xae, 0x5, 0x6, 0x6d9]}}, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x40, {0x54, 0xe, 0x1, 0x20, [0x101, 0xff, 0x80000001, 0x9, 0xb33, 0xffffffff, 0x4]}}, @generic={0x20, 0x36, "7ef47c187c8452f04f3764dce0ef71dc89d9ef25c3e6a5351df9ce3815c830f95cfdcbecd976de7fba382798b756ff3a5fcbd58e58db"}, @enc_lim, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x0, 0x2, 0xff, 0x101, [0x0]}}, @jumbo]}}}], 0x158}}, {{&(0x7f0000001980)={0xa, 0x4e20, 0x2, @mcast1, 0x3}, 0x1c, &(0x7f0000001b00)=[{&(0x7f00000019c0)}, {&(0x7f0000001a00)="7d3ccddc328d29639fe348e4cc28d27ca5719b77a68bdbedc7c88fc669a48838afb79d8b05ebfdc29f8933c2d6e3b8c7ffeaf7d94a85975774c7610ca714dfdf2ba26a3ce2c284d1e1db5ee1e14c4ee4aae29e1b7e97dccc3658f2705df3c2a220d4291d6cd11e3e28bc4f0735ae52384f5bb0041312e73eb1605dd948321a4cbe5cfce0bb6067f54d9f55eb91506b2d767740299c7f65c228a192e7f7904997ae818567cdca1217cbf9deccb7c5883784af13e749e3b93a3736e3fc78f20cc9fad471527bc1879637d08620f956c0340b5079acd5fc815096009cf4f2cdbdf3b4338f165be021bf460da1dbac69860332e890b29639b7", 0xf7}], 0x2, &(0x7f0000001b40)=[@hoplimit={{0x14, 0x29, 0x34, 0x100}}], 0x18}}], 0x3, 0x4000000) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/cachefiles\x00', 0x138282, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8000) ioctl$VIDIOC_SUBDEV_S_FMT(r4, 0xc0585605, &(0x7f0000000080)={0x2, 0x0, {0x1f, 0x7f, 0x2024, 0x3, 0x8, 0x2, 0x0, 0x3}}) [ 671.824128] audit: type=1400 audit(1576158887.564:19158): avc: denied { map } for pid=18948 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 13:54:48 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x100) [ 672.092790] audit: type=1400 audit(1576158887.564:19159): avc: denied { map } for pid=18948 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1ce601, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x27c) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x7, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r10 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x101, 0x201000) r11 = syz_open_dev$tty1(0xc, 0x4, 0x4) kcmp$KCMP_EPOLL_TFD(r8, 0x0, 0x7, r9, &(0x7f0000000180)={r10, r11, 0x40}) [ 672.265394] audit: type=1400 audit(1576158887.584:19160): avc: denied { map } for pid=18950 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:48 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) [ 672.438118] audit: type=1400 audit(1576158887.594:19161): avc: denied { map } for pid=18948 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:48 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) get_thread_area(&(0x7f0000000000)={0x80000000, 0x100000, 0x1400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) shutdown(r0, 0x1) [ 672.663762] audit: type=1400 audit(1576158887.594:19162): avc: denied { map } for pid=18950 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ocfs2_control\x00', 0x30000, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000003c0)=0x8001, 0x4) [ 672.867015] audit: type=1400 audit(1576158887.614:19163): avc: denied { map } for pid=18950 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 672.979628] audit: type=1400 audit(1576158887.614:19164): avc: denied { map } for pid=18950 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r7 = fcntl$getown(r0, 0x9) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r9 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r8, r9) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r11 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r10, r11) kcmp(r6, r7, 0x2, r8, r10) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r13 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r12, r13) r14 = dup3(r8, r12, 0x80000) ioctl$EVIOCGKEYCODE(r14, 0x80084504, &(0x7f00000000c0)=""/104) 13:54:49 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) [ 673.136441] audit: type=1400 audit(1576158887.634:19165): avc: denied { map } for pid=18948 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 673.202210] device bridge_slave_1 left promiscuous mode [ 673.208120] bridge0: port 2(bridge_slave_1) entered disabled state 13:54:49 executing program 3: r0 = dup(0xffffffffffffffff) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0xb22}, 0xf) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) [ 673.393233] device bridge_slave_0 left promiscuous mode [ 673.398848] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.935048] device hsr_slave_1 left promiscuous mode [ 674.060951] device hsr_slave_0 left promiscuous mode [ 674.194502] team0 (unregistering): Port device team_slave_1 removed [ 674.253366] team0 (unregistering): Port device team_slave_0 removed [ 674.332992] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 674.422297] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 674.556722] bond0 (unregistering): Released all slaves [ 676.231515] IPVS: ftp: loaded support on port[0] = 21 [ 677.141746] chnl_net:caif_netlink_parms(): no params data found [ 677.167078] kauditd_printk_skb: 191 callbacks suppressed [ 677.167086] audit: type=1400 audit(1576158893.224:19309): avc: denied { map } for pid=19023 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.199049] audit: type=1400 audit(1576158893.224:19310): avc: denied { map } for pid=19023 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.226361] audit: type=1400 audit(1576158893.234:19311): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.254435] audit: type=1400 audit(1576158893.234:19312): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.285148] audit: type=1400 audit(1576158893.234:19313): avc: denied { map } for pid=19023 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.308954] audit: type=1400 audit(1576158893.244:19314): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.334391] audit: type=1400 audit(1576158893.244:19315): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.360887] audit: type=1400 audit(1576158893.244:19316): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.385270] audit: type=1400 audit(1576158893.244:19317): avc: denied { map } for pid=19023 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.416725] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.423281] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.430380] device bridge_slave_0 entered promiscuous mode [ 677.439430] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.445986] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.453024] device bridge_slave_1 entered promiscuous mode [ 677.475935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 677.487365] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 677.510307] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 677.517454] team0: Port device team_slave_0 added [ 677.525391] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 677.532703] team0: Port device team_slave_1 added [ 677.540311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 677.549653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 677.622392] device hsr_slave_0 entered promiscuous mode [ 677.670708] device hsr_slave_1 entered promiscuous mode [ 677.714050] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 677.724107] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 677.756949] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.763601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.770307] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.776672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.862173] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 677.868282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 677.884103] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 677.897505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.905123] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.912025] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.925908] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 677.932251] 8021q: adding VLAN 0 to HW filter on device team0 [ 677.947148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.954999] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.961425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.975616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.983530] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.989892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.019266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.027600] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.038846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.054299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.068588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.082187] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 678.088370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.116524] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 678.123308] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 678.137343] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 678.143731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 678.153991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 678.173230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 678.188090] audit: type=1400 audit(1576158894.244:19318): avc: denied { map } for pid=19024 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 679.750126] protocol 88fb is buggy, dev hsr_slave_0 [ 679.755339] protocol 88fb is buggy, dev hsr_slave_1 [ 680.000328] protocol 88fb is buggy, dev hsr_slave_0 [ 680.005466] protocol 88fb is buggy, dev hsr_slave_1 13:54:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:56 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='\x00\x00\x00\t\xea\x00\x00\x00\x00\b', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2406e2965313fbb93b0081b924fefff883ad211016440b6f94475eb5eec3094b646472d4b1143ac03f0213ef70b0fbb2308753ad74634acbd4de0fa811aa2228aa11eb009124a358b88412a1c219ec241b7a9da6386d38d8f1ed4f27df1e46ec42f4cf6f9a"]) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x9, 0x2ea) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000080)={0x1, 0x1, 0x9, 0x100}) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x374}) dup2(r5, r6) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x1) 13:54:56 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e8088631481b824c545"], 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setfsuid(r1) 13:54:56 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x882, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_proto_private(r1, 0x89e2, &(0x7f00000000c0)="bb77a878b46a7c836b57f009e436f9e0b0f86c41623c1dc6483685ca333e9e022612c1328f6dbbcb1e18feff998b2f124c3dedb95201c72645c4") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xfffffffffffffffe) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x2, 0x2, 0x4, 0x1000, &(0x7f0000ff4000/0x1000)=nil}) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r6, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:54:56 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r4) fcntl$setstatus(r1, 0x4, 0x2000) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f00000000c0)=[{&(0x7f00000002c0)="58fa557c08a8c6b36982ede634a3f72017a56a7982d8e8a5d0c20a5d047243e50b4dec33235303556c3896ce28cd78135efc5208282391af6c7f929fd8842e6faed7706139d2971b94da75dbcea798d580ac1867d4647487e261727cef7a7dce1e895c77713a60f21f788bbceac57c35a92b1d72417506585eaace0b0a7ff33e43837672ca815bf0de3b4feeb5df500025b04000e9a721e6350ad6f2bdc5179b1b378f351e97863883e3415ac660866d966106c71e46f0023b37e407e4c33d435dea7aa899215bd96dec184da7771469fed0691d9cf1ec7c67fcca3a45140c6530ddef6544d8fe141ce291d4b2f3a4b81a01cca2e2397b63308a9e097880", 0xfe, 0x9}, {&(0x7f00000003c0)="3387749e70b51b7b3810dd173b7dc630f4bbc369fc78ed16c5f60ef5498c5ce3631501857f81e7dc306d5487f086b7a1b8f1542e0202a4ad416dee8ef3cfcd705d9804020d5ad51c575a83799be24c6c321106333bab73129ff1502482416ff0eef9a95769f94d32177a1fc8ea67544e22163da544c1d0488a217050c2235679741dd7c1537d38c73dd09b5247eece4cb1f8607b430b46585baa5819eaa4a058d8346f94394d3ad5557b9cbab4cd92e6926f589bed8f855c15a7fe63523ac4bb8c369f47e7c96964d2ac791cf1562105641c", 0xd2}], 0x149028, &(0x7f0000000100)='#&!\\wlan0wlan0\x9c\xf5vboxnet1\x00') 13:54:56 executing program 5: socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:56 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) read$usbmon(r0, &(0x7f0000000380)=""/232, 0xe8) 13:54:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10001, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 13:54:56 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) r2 = dup(r1) ioctl$TCSETXF(r2, 0x5434, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='logon\x00', &(0x7f00000000c0)={'s{:'}, &(0x7f0000000240)='n', 0x1, r3) r4 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$set_timeout(0xf, r4, 0xffffff6e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:54:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x10000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:54:57 executing program 5: socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:54:57 executing program 4: syz_emit_ethernet(0x18, &(0x7f0000000000)={@random="fc5872f50c8e", @local, [{[], {0x8100, 0x7, 0x1, 0x1}}], {@generic={0xf8, "90a7030000e8"}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000140)=0x4) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) dup2(r0, r1) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000000180)={{0x0, @local, 0x4e24, 0x0, 'lc\x00', 0x20, 0x4, 0x72}, {@empty, 0x4e20, 0x2003, 0x3, 0x3, 0x8001}}, 0x44) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x7, {{0xa, 0x4e24, 0x6, @local, 0x40}}}, 0x88) 13:54:57 executing program 5: socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0050ff", 0x2e}], 0x1}, 0x0) 13:54:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f00000000c0)) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @adiantum, 0x1, "e884537cd4f6100d"}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) 13:54:57 executing program 2: getrlimit(0x5, &(0x7f0000000040)) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)=""/246, 0xf6) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='duse\x00', 0x0, &(0x7f00000005c0)=ANY=[]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0xb8, 0x4, 0x0, {0x1, 0x0, 0x57}}, 0x28) 13:54:58 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0x9cdf, 0x7f, 0x7fff}) [ 682.197306] kauditd_printk_skb: 139 callbacks suppressed [ 682.197315] audit: type=1400 audit(1576158898.254:19458): avc: denied { map } for pid=19091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.397677] audit: type=1400 audit(1576158898.294:19459): avc: denied { map } for pid=19091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000000)) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f00000000c0)={{0x42, 0x4}, {0x1, 0x1}, 0x1ff, 0x1, 0x1d}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r7 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r7, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 13:54:58 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 682.573106] audit: type=1400 audit(1576158898.314:19460): avc: denied { map } for pid=19091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.766676] audit: type=1400 audit(1576158898.314:19461): avc: denied { map } for pid=19091 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.967143] QAT: Invalid ioctl [ 682.998182] audit: type=1400 audit(1576158898.374:19462): avc: denied { map } for pid=19091 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:54:59 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', r1}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22000040}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getnetconf={0x2c, 0x52, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x46f}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x8000) [ 683.053532] QAT: Invalid ioctl 13:54:59 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 683.081103] device bridge_slave_1 left promiscuous mode [ 683.088521] bridge0: port 2(bridge_slave_1) entered disabled state 13:54:59 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2ec0886394a7030000e8"], 0x0) [ 683.222379] audit: type=1400 audit(1576158898.404:19463): avc: denied { map } for pid=19096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.279074] device bridge_slave_0 left promiscuous mode [ 683.286949] bridge0: port 1(bridge_slave_0) entered disabled state 13:54:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xef) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 683.460729] audit: type=1400 audit(1576158898.404:19464): avc: denied { map } for pid=19096 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.582634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 683.618110] audit: type=1400 audit(1576158898.414:19465): avc: denied { map } for pid=19091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.672320] audit: audit_lost=256 audit_rate_limit=0 audit_backlog_limit=64 [ 684.053425] device hsr_slave_1 left promiscuous mode [ 684.162974] device hsr_slave_0 left promiscuous mode [ 684.245740] team0 (unregistering): Port device team_slave_1 removed [ 684.321554] team0 (unregistering): Port device team_slave_0 removed [ 684.385662] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 684.456794] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 684.617286] bond0 (unregistering): Released all slaves [ 686.721449] IPVS: ftp: loaded support on port[0] = 21 [ 687.581364] chnl_net:caif_netlink_parms(): no params data found [ 687.605521] kauditd_printk_skb: 194 callbacks suppressed [ 687.605529] audit: type=1400 audit(1576158903.664:19635): avc: denied { map } for pid=19148 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.634207] audit: type=1400 audit(1576158903.664:19636): avc: denied { map } for pid=19148 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.657551] audit: type=1400 audit(1576158903.664:19637): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.681989] audit: type=1400 audit(1576158903.664:19638): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.706262] audit: type=1400 audit(1576158903.674:19639): avc: denied { map } for pid=19148 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.706283] audit: type=1400 audit(1576158903.674:19640): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.706299] audit: type=1400 audit(1576158903.674:19641): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.706316] audit: type=1400 audit(1576158903.674:19642): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.753935] audit: type=1400 audit(1576158903.674:19643): avc: denied { map } for pid=19148 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.846284] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.852748] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.859642] device bridge_slave_0 entered promiscuous mode [ 687.868165] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.874657] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.881921] device bridge_slave_1 entered promiscuous mode [ 687.901363] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 687.912055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 687.934750] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 687.942112] team0: Port device team_slave_0 added [ 687.949443] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 687.957322] team0: Port device team_slave_1 added [ 687.965025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 687.974681] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 688.032328] device hsr_slave_0 entered promiscuous mode [ 688.070596] device hsr_slave_1 entered promiscuous mode [ 688.132935] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 688.151265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 688.183055] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.189510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.197388] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.203806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.292541] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 688.298659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 688.314517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 688.328107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 688.335783] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.342986] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.357621] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 688.363866] 8021q: adding VLAN 0 to HW filter on device team0 [ 688.379245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 688.386925] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.393317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.410409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 688.418045] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.424461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.448631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 688.470508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 688.477836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 688.488190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 688.503237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 688.518024] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 688.525212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 688.552406] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 688.565193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 688.572856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 688.579651] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 688.599483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 688.616671] audit: type=1400 audit(1576158904.674:19644): avc: denied { map } for pid=19149 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 690.390552] protocol 88fb is buggy, dev hsr_slave_0 [ 690.395685] protocol 88fb is buggy, dev hsr_slave_1 [ 690.790144] protocol 88fb is buggy, dev hsr_slave_0 [ 690.795305] protocol 88fb is buggy, dev hsr_slave_1 13:55:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 13:55:07 executing program 4: syz_emit_ethernet(0xffffffffffffffc6, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaab7a949c1459f50aaaaaaaaaa19454601fcffc07a89be0897344ae4a9"], 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0xbf36fcc4ded8a18e) lseek(r0, 0xe9, 0x2) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000100)) 13:55:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x30, r0, 0x0) 13:55:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) sendto$unix(r1, &(0x7f0000000140)="a14311e581db52d7777b954cd52a29255f428e4d663080a8a84a0e23ac209967141b7e8d497a119c3dee32398e1ac7a1c76bc0d6c12470dcf521fe0b272d9c6eacaa57fbf5be4a900e49e415d52a1bd36a2bb7117d75f11f72d4806a543ea5731a9aff9f278fb5fb40a6635575189028129c27220e939e8c5d1b4f33a98040fa7c8a4b59965954454036", 0x8a, 0x400c404, &(0x7f00000002c0)=@abs={0x2, 0x0, 0x4e20}, 0x6e) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x4bc040, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000380)={0x7, 0x4}) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) ioctl$EVIOCGLED(r6, 0x80404519, &(0x7f00000003c0)=""/35) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r10}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000340)={r10, 0x6}, 0xc) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x242, 0x0) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) r13 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r14 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r13, r14) r15 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r16 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r15, r16) r17 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r18 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r17, r18) r19 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r20 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r19, r20) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000600)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRES16=r16, @ANYRESHEX=r0, @ANYRES16=0x0, @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRES16=r11, @ANYRES16, @ANYPTR64=&(0x7f0000000400)=ANY=[], @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES64=r20, @ANYRESOCT], @ANYBLOB="fec6858e80a880e151e1d03bee979d30d8261519099ebbfc3ca7dbdf69c6ac5b2ffc500258d5f447f634c64193098385a25f499e9c7e88bf06bf22db7abf4e0562e8a746f7cf06978fc9467064b674be3238eefed4b4e761c9f379675f43d3305a5aa9a2074769776d6e85c1340c51a18efdf0bb1536f9d97ee29138f4ba1e0eb0f34c9dca1e2eff861291d2c55ae884300865f845ee7a38f71490b0a77f5ff896587e233ec514d8d8d60d091e4ea89aa4e788e1a267e855b296f2a716d77997155542a89867ce940e0102edf3b73ddd4b9bbe0f365c447c2ef98d34d20c40527f13447ee792a27adb055740e387293b36b0", @ANYRESOCT=r14, @ANYRES32=0x0, @ANYRESOCT=r17, @ANYRESOCT], @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) r21 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r22 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r21, r22) ioctl$USBDEVFS_IOCTL(r21, 0xc0105512, &(0x7f0000000240)=@usbdevfs_disconnect={0xffffffff}) r23 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r24 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r23, r24) fcntl$setpipe(r24, 0x407, 0x2) 13:55:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r5 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r5, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:55:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:55:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) timer_create(0x5, &(0x7f0000000100)={0x0, 0x34, 0x0, @thr={&(0x7f0000000040)="cf3008c40fd97368cd9e46b64b4796011ec10fac6d93589586d8c47f9fd13f7e3fd59c0be9033e15143fec684964da29fca51d513c69f93e23ff87b9", &(0x7f0000000080)="124178b273cbc6cb87754d5f66ddaefd7451c866a967093908292f363f496df08a4f4ce30f08be13f600978af3c82e8a1fc8d15d4abc0f2ea511c85d8a8d0489c8d00b53e6991ba8ebbd1959ae50c9dd967b421031fe4807e017fc977c334f8cc2d5c23ddc2a1185a3e1b6c000e873ce95939260dab4eb1314f4e40fbb"}}, &(0x7f0000000140)=0x0) timer_delete(r1) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:07 executing program 4: syz_emit_ethernet(0x14, &(0x7f00000000c0)={@broadcast, @random="c2b347065261", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000000)) 13:55:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:07 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:55:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x515b0e9cf801cff) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000080)={0x2, 0x401, [{0x8737, 0x0, 0x1}, {0x5, 0x0, 0x9}]}) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x0, 0x2, 0x2, 0x3, 0x6}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0xffffff53, 0x4, 0x0, {0x1}}, 0x28) 13:55:07 executing program 4: syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @random="c2b31dec2e80", [], {@llc_tr={0x11, {@snap={0x1, 0x1, "18", "3c01f0", 0x19, "136fbd2c2f509e73ab4892be63fcabc369365b1da84f9b09a1707bc7708d"}}}}}, 0x0) 13:55:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f00000000c0)={0xa, [0xe01, 0x0, 0x0, 0x7ff, 0x9, 0x6, 0x0, 0x101, 0x9, 0x1]}, &(0x7f0000000100)=0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:55:08 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:55:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x1, 0x8, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) write$USERIO_CMD_REGISTER(r4, &(0x7f0000000300)={0x0, 0x4}, 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) getsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000240), &(0x7f00000002c0)=0x4) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:08 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e80886394af230000e8"], 0x0) [ 692.629996] kauditd_printk_skb: 128 callbacks suppressed [ 692.630011] audit: type=1400 audit(1576158908.684:19773): avc: denied { map } for pid=19207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 692.790897] audit: type=1400 audit(1576158908.694:19774): avc: denied { map } for pid=19207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 692.954283] audit: type=1400 audit(1576158908.734:19775): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:55:09 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) migrate_pages(r1, 0x10000, &(0x7f0000000040)=0x20, &(0x7f00000001c0)=0x80000000) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x28) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$VT_DISALLOCATE(r2, 0x5608) 13:55:09 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 693.147654] audit: type=1400 audit(1576158908.734:19776): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:55:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) mmap$dsp(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x2, 0x100010, r4, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r6, 0x6, 0x15, &(0x7f0000000000)=0x2, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:55:09 executing program 4: lsetxattr$smack_xattr_label(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000180)={'proc!'}, 0x6, 0x1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0xa0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) r1 = geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_FP_MODE(0x2d, 0x1) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x4021, &(0x7f0000000340)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x800}}, {@rq={'rq', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0x3}}, {@common=@debug={'debug', 0x3d, 0xc6}}, {@sq={'sq', 0x3d, 0x8000}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@euid_lt={'euid<', r2}}, {@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'system'}}, {@uid_gt={'uid>', 0xee00}}, {@appraise='appraise'}, {@fowner_lt={'fowner<'}}]}}) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="80001600", [], {@generic={0x0, "9487f4ff00e8"}}}, 0x0) [ 693.320091] audit: type=1400 audit(1576158908.794:19777): avc: denied { map } for pid=19207 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.470090] audit: type=1400 audit(1576158908.824:19778): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.630574] audit: type=1400 audit(1576158908.844:19779): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.844460] audit: type=1400 audit(1576158908.854:19780): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.990466] device bridge_slave_1 left promiscuous mode [ 693.998506] bridge0: port 2(bridge_slave_1) entered disabled state [ 694.054921] audit: type=1400 audit(1576158908.894:19781): avc: denied { map } for pid=19207 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 694.133991] device bridge_slave_0 left promiscuous mode [ 694.139568] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.253243] audit: type=1400 audit(1576158908.934:19782): avc: denied { map } for pid=19210 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 694.714299] device hsr_slave_1 left promiscuous mode [ 694.774388] device hsr_slave_0 left promiscuous mode [ 694.807197] team0 (unregistering): Port device team_slave_1 removed [ 694.825023] team0 (unregistering): Port device team_slave_0 removed [ 694.836534] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 694.903225] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 694.954945] bond0 (unregistering): Released all slaves [ 696.630966] IPVS: ftp: loaded support on port[0] = 21 [ 697.474588] chnl_net:caif_netlink_parms(): no params data found [ 697.546868] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.553821] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.561341] device bridge_slave_0 entered promiscuous mode [ 697.570616] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.577394] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.584697] device bridge_slave_1 entered promiscuous mode [ 697.606427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 697.618691] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 697.641618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 697.648738] team0: Port device team_slave_0 added [ 697.656534] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 697.663718] team0: Port device team_slave_1 added [ 697.671817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 697.681860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 697.742347] device hsr_slave_0 entered promiscuous mode [ 697.780459] device hsr_slave_1 entered promiscuous mode [ 697.842937] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 697.853746] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 697.885672] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.892128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.898743] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.905155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.991868] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 697.998109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 698.014654] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 698.028106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.036046] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.043159] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.056540] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 698.063031] 8021q: adding VLAN 0 to HW filter on device team0 [ 698.078147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.086100] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.092696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.109837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.117705] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.124104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.153963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 698.162563] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 698.176740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 698.189787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.203983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.219318] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 698.225834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 698.253345] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 698.265676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 698.272795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 698.291987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 698.307351] kauditd_printk_skb: 122 callbacks suppressed [ 698.307359] audit: type=1400 audit(1576158914.364:19905): avc: denied { map } for pid=19252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.337147] audit: type=1400 audit(1576158914.364:19906): avc: denied { map } for pid=19252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.361132] audit: type=1400 audit(1576158914.364:19907): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.386500] audit: type=1400 audit(1576158914.364:19908): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.412817] audit: type=1400 audit(1576158914.374:19909): avc: denied { map } for pid=19252 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.436939] audit: type=1400 audit(1576158914.374:19910): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.463634] audit: type=1400 audit(1576158914.374:19911): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.473705] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 698.501175] audit: type=1400 audit(1576158914.374:19912): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.529046] audit: type=1400 audit(1576158914.374:19913): avc: denied { map } for pid=19252 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.559553] audit: type=1400 audit(1576158914.424:19914): avc: denied { map } for pid=19253 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 700.400171] protocol 88fb is buggy, dev hsr_slave_0 [ 700.405393] protocol 88fb is buggy, dev hsr_slave_1 [ 700.550153] protocol 88fb is buggy, dev hsr_slave_0 [ 700.555293] protocol 88fb is buggy, dev hsr_slave_1 13:55:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:16 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 13:55:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r3, 0x81, 0x8, [0x13, 0xaba, 0x5, 0x8000, 0x4, 0x20, 0x1, 0x870]}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4, 0x2}, &(0x7f00000000c0)=0x8) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:16 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d1243203261f1722dae12d7312873007a79f8b4d3fa715125b608504d953aca75e0c69ff1b73c47607d2afeaa65dc55bcb759e0b1131ddab7ae8ac6cfef9da69d91ba8b472eb2b651eb7357e3c3c72a657915361dfc18470dbef74f4b16553525081f14320597b1f329e1113b428e3df03ba17bcd", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:55:16 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x84002, 0x0) dup2(r0, r1) ioctl$TCSBRKP(r0, 0x5425, 0xff) socket$inet6_udplite(0xa, 0x2, 0x88) 13:55:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$sock_bt_hci(r4, 0x0, &(0x7f00000002c0)="364b74c4ac887787d59029a0b2b6c8f85c2c5d7cdb542ace319b317067f1a0ebb0523b9ff2fa629f1fe66098e3674a9dc4a50f854a1957153c95f8f14156fdabd6c93332cb3cc6cb4325631404e6d9c984ec08eea5971b2a781cb65bcc0516db535030af34d5273e559a18dc5ad271017aaaf4b39ec9cacdf648eda75cf485c6389b1c9d1ee1d1855cf8dfe47fd0d193a8702d2f1b9f306abf96dadffb0023cb1351") r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r8, 0x400, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfffffffa, 0x1, 0x7, 0x6}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r11 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x84440, 0x0) ioctl$EVIOCGABS3F(r11, 0x8018457f, &(0x7f00000000c0)=""/42) 13:55:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x30, r0, 0x19cd2000) 13:55:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 13:55:17 executing program 4: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x2) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:55:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x2000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:55:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8}, 0xffffffffffffff7c) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6}, 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x11b180, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:17 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 13:55:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$netlink(0x10, 0x3, 0x12) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80008010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x1) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:55:17 executing program 4: recvfrom$inet(0xffffffffffffffff, &(0x7f0000000100)=""/132, 0x84, 0x40018040, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x27a8, "e83ee0ff962e6db025a4cdbf413770d493387cb5c5a2bb4af6748e40d2952de4", 0x4, 0x32, 0x1ff, 0x1, 0x0, 0x2, 0x3f, 0xfffffff8}) 13:55:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r7, r8) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) r13 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x20800, 0x0) io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, r4, &(0x7f00000000c0)="dae93fcb5736dda696ccb0c2226060c1c7d4905733679d693a360dbd014a2e3846498a6960bd24dc82cf5f74b9ce476b34785cf6a6e4efcf1d02e588b3c0ed65fd786d395a2f", 0x46, 0x3, 0x0, 0x2, r5}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7, r8, &(0x7f0000000180)="b99ca82ad5c88ee42583b6ed2004cc7cffc5b0724f9ac440437810a2e4139a5539181883bfc5f057b045d91031eaf3ebc48d5c", 0x33, 0x100000001, 0x0, 0x0, r9}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0xff, r12, &(0x7f0000000240)="233066343f0f8fae45afe8ad49e555faca0ea2477a5f3ca636409bdfccd3a80be7c10e956b68174db369ed0ad116f8a22b6a65e0e0bb28f051d803e0e4cbaa11e3c710dec55d2c83a32db763f3fbd063e4ef66e05a1c059da326bc0b0ec93ce924ac2a3bbcc032cbb4100a0180c266b35d6cc39c82136829", 0x78, 0x0, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0xfffe, r3, &(0x7f0000000300)="fb88a0ef154dbad8f1ce33c1b05e01c0a4cd4b20d3a864bcb8a0f59ed18fd50933a141dc03ab5a929f6ce00699307250d2deb74ad066027b0df30cab86a964fc1035433ace58ca07d3bd65c662ac11cc54980b067145cd1e63d52f2142a235a2918eaab90858405d010641e148749d3960595bf55fa8cf897e4a5c4ddb6662f0d657f1023d47a6916206b8b9f0db79a34598dade2d5bae5a0b947bd70f0c5f3e2f04a448e25cd7e411fbb537fd526dbb4d23e28739fd381c5e13639fa8e9dc60625556684fb1905e6eb0c3257b5b76962b7f8ab7f0cc40bd0beb61fc5c2a94be28ee33844771ee69f41eeb1daf155748776cdf6277", 0xf5, 0x3, 0x0, 0x2, r13}]) 13:55:18 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) getsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140), &(0x7f0000000180)=0x4) 13:55:18 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 13:55:18 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 13:55:18 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000980)="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", 0x1000, 0x80}, {&(0x7f00000001c0)="09b4dc238c92c3c1df2e27e08285f9d0083b04006e8091482f846ed9e9f3d467956900873969f5f121dde350ef568097326b1a699a4beec42a8430b339c84238690fe121b36058d590f03320edf14c642787f65bf420e871a61b49a763da36f7067667809ce2fb6701d10579efccc382f2f8036bc433d1a636870bd5c9f0308cb5563911a2a47d7de34c488cbe8bba890df08c340f58d2093d6f361ed7d23a41ea279894e13845ef68f517bba16622a14ed779f4e08e34ecffb5e8e74f6dc1d2d1a52748dad0f05cfc26766d882215d079c45f0bbcb2ead0820dc0ba9ffac8e8a5d1c698496d8db981c47cc3e4b824ea9bc3c4682c18fb", 0xf7, 0x3}, {&(0x7f00000002c0)="0955a4ba6b3374177f7a185228d28d46bca2cbe90f2c4ab7294b4577a358dbe339a4978de2a6d8a8c0723cd8da2ddcc6629ac415a5f810286bce873f4aa24efa1c4f21ed97e9bf5f3c18a9d43adae11491e83be79d8e7e11580b68dbd3ac2f8e873546c03c02f6d5a54ee7e1860b3555d62a95c048f1ccd52583d9feaa5f6ed082eca350797ce5517fc3e07a15b964143c01ab46c6cb35d15ad897afb471f4c78d744af75735f6eeaea4ee16ba9616a01b", 0xb1, 0x3}, {&(0x7f0000000380)="164c73faa5737e9868cabed98de6e24b8f781a5a50059629a233ada8be62c64a32f4229b107ee25000f4affdbd254238eb53e1e7175dba0bbb2f7b2b2e697498d7f597ee92aa855d4f584088d73940b09dcb50c4a384cc93d42c7f1756d72937518de18043c07f32cd5055b0", 0x6c}, {&(0x7f0000000400)="ac64d7159361ea81bb6f71ac", 0xc, 0x5ce}, {&(0x7f0000000440)="b22020480f4498009dafd0acbbef47528f1785bbd6b19664be3abae72db5d70c9b9c180b292042d3373990bc5531285f8f714bc1ab83871dd4d355ba6ffe0abc6c949548815ac1c74760bd4e9ab6ee67b458beb913c7d415a947102d4f82a74ca5108d687a2b8da7eac9cacfa262412cb5fb41524c56df5f54bf38bd1e704c98219853d7d37d8bd4171d78749540411a5bc3c145521ab4f1c6ff26301af5c6b55889e6b9610743c815416b28ce099cda0ee43b32cc7e144228", 0xb9, 0x4}, {&(0x7f0000001980)="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", 0x1000, 0x9}, {&(0x7f0000000500)="26c38aa1d476669040d98d028550100e4d5d6d959220a54343dc7757258530e5f3e23761fd32c8a2f0f058ddc5fcba73fe8130122f2c5a667a32b544676c7f1711bf03838fdd1e38cec203a2d4f664b056c2c4dfb9579980553646b5772133ba52f7fc270ddec9f24cfd47ad84973fd192d570771386dd0b4b0ad84cd14be2cf66a4ff35ed84f296b29f367aefab30134f3bdb89f1faf33b822c39aa3820e2905fd4d4bfe019fe56a80e949c0ac276064e73", 0xb2, 0x20}, {&(0x7f00000005c0)="10b7065f8cc5ea0db50e216e88932ff26de65c904c657212df5e39156d853b4a9846069b94eefd2d4ff4f65087fd475965d51c3e30a0805add9c96ecfade88ae322b1d56c754cfaa3d539924c258d074b2a371a6d5c7452b9f1f4b3ab2e2adfd5dd1261751b9f59e5e6e42e4a47c487adb54ff34beac8d456f8aac8d42154ec413b4775d92220afb10e694d3e81bd64e3cd31741475ffa809326d5cecf32e7654c83f721bfa9385e5e1d0fb1bcc90036346ac43ae4299cb2e78b04eee09e969af5457128598245ec49241ee9800813f78f89c23f5be4ebda3a2f58bbe89743e8d4b938428d534619309c1a", 0xeb}], 0x100000, &(0x7f00000007c0)={[{@type={'type', 0x3d, "078500b0"}}, {@nodecompose='nodecompose'}, {@session={'session'}}, {@type={'type', 0x3d, "5cbdad88"}}, {@nls={'nls', 0x3d, 'cp775'}}, {@barrier='barrier'}, {@umask={'umask', 0x3d, 0x3ff}}, {@force='force'}, {@nls={'nls', 0x3d, 'euc-jp'}}, {@creator={'creator', 0x3d, "1e7c399c"}}], [{@subj_role={'subj_role', 0x3d, 'user_id'}}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="28000000040000000000000000000000010000000000000000000000000000000000000000000000e848923d867710d2473b15e21cc8acbfbef3"], 0x28) 13:55:19 executing program 4: syz_emit_ethernet(0x0, &(0x7f00000000c0)=ANY=[], 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x2, 0x3}}, 0x14) 13:55:19 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 703.400302] device bridge_slave_1 left promiscuous mode [ 703.406519] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.454330] kauditd_printk_skb: 176 callbacks suppressed [ 703.454338] audit: type=1400 audit(1576158919.514:20091): avc: denied { map } for pid=19334 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.564702] device bridge_slave_0 left promiscuous mode [ 703.572177] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.645523] audit: type=1400 audit(1576158919.544:20092): avc: denied { map } for pid=19337 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.790127] audit: type=1400 audit(1576158919.544:20093): avc: denied { map } for pid=19337 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.880117] audit: type=1400 audit(1576158919.554:20094): avc: denied { map } for pid=19334 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.030156] audit: type=1400 audit(1576158919.564:20095): avc: denied { map } for pid=19337 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.123030] audit: type=1400 audit(1576158919.564:20096): avc: denied { map } for pid=19337 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.170169] device hsr_slave_1 left promiscuous mode [ 704.200342] audit: type=1400 audit(1576158919.564:20097): avc: denied { map } for pid=19334 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.278421] device hsr_slave_0 left promiscuous mode [ 704.286133] audit: type=1400 audit(1576158919.574:20098): avc: denied { map } for pid=19334 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.316346] audit: type=1400 audit(1576158919.604:20099): avc: denied { map } for pid=19334 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.348363] audit: type=1400 audit(1576158919.634:20100): avc: denied { map } for pid=19334 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.376777] team0 (unregistering): Port device team_slave_1 removed [ 704.389622] team0 (unregistering): Port device team_slave_0 removed [ 704.405984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 704.456440] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 704.571826] bond0 (unregistering): Released all slaves [ 706.271515] IPVS: ftp: loaded support on port[0] = 21 [ 707.123257] chnl_net:caif_netlink_parms(): no params data found [ 707.194254] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.200873] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.207723] device bridge_slave_0 entered promiscuous mode [ 707.216842] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.223916] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.230893] device bridge_slave_1 entered promiscuous mode [ 707.252671] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 707.263910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 707.285949] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 707.293289] team0: Port device team_slave_0 added [ 707.300950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 707.307990] team0: Port device team_slave_1 added [ 707.315556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 707.326027] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 707.382185] device hsr_slave_0 entered promiscuous mode [ 707.440410] device hsr_slave_1 entered promiscuous mode [ 707.482789] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 707.493488] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 707.522681] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.529053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.535693] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.542071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.624575] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 707.630872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 707.651233] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 707.665131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.674511] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.681964] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.699021] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 707.705674] 8021q: adding VLAN 0 to HW filter on device team0 [ 707.718841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.726842] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.733232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.747155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.755037] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.761445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.788521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 707.798228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 707.813781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 707.827074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.841815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 707.858072] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 707.864311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 707.892145] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 707.905128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 707.911962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 707.933199] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 708.110316] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 708.929549] kauditd_printk_skb: 160 callbacks suppressed [ 708.929558] audit: type=1400 audit(1576158924.984:20261): avc: denied { map } for pid=19361 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.958607] audit: type=1400 audit(1576158924.984:20262): avc: denied { map } for pid=19361 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.981096] audit: type=1400 audit(1576158924.984:20263): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.005377] audit: type=1400 audit(1576158924.984:20264): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.029700] audit: type=1400 audit(1576158924.994:20265): avc: denied { map } for pid=19361 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.053349] audit: type=1400 audit(1576158924.994:20266): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.078189] audit: type=1400 audit(1576158924.994:20267): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.103065] audit: type=1400 audit(1576158924.994:20268): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.128156] audit: type=1400 audit(1576158924.994:20269): avc: denied { map } for pid=19361 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.574095] audit: type=1400 audit(1576158925.634:20270): avc: denied { map } for pid=19362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 710.390297] protocol 88fb is buggy, dev hsr_slave_0 [ 710.395387] protocol 88fb is buggy, dev hsr_slave_1 [ 710.400113] protocol 88fb is buggy, dev hsr_slave_0 [ 710.405491] protocol 88fb is buggy, dev hsr_slave_1 13:55:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6}, 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:26 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x0, 0x0, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000040), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x28}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff, 0x0, @empty, {[0xff, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0x80, 0x0, 0x0, 0x0, 0x101]}, 0x0, 0x6, 0x1000, 0x8, 0xcb2, 0x888e, 'bond0\x00', 'veth0_to_bond\x00', {0x536a646e4eee4c90}, {}, 0x0, 0x8}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @empty, @rand_addr=0x400, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2200, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000680)) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) 13:55:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0xfff, 0xee175e0, 0x3, 0x6, 0x6, [{0x5, 0x7, 0x6, 0x0, 0x0, 0x200}, {0x4, 0x6, 0x0, 0x0, 0x0, 0x800}, {0x2, 0x9493, 0x7fff, 0x0, 0x0, 0xb04}, {0x22b9, 0x2, 0x1f, 0x0, 0x0, 0x100}, {0x5, 0x1000, 0x200, 0x0, 0x0, 0xc0a}, {0xac5, 0xfff, 0x1d, 0x0, 0x0, 0x2000}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x1000, &(0x7f000003a000/0x1000)=nil}) r3 = eventfd(0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x660400, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f00000000c0)) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x1, r3, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:55:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x865a23969dc9c77b) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@remote={[], 0x2}, 0x6, 'tunl0\x00'}) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) read(r2, &(0x7f00000006c0)=""/43, 0x2b) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f00000001c0)={{0x9, 0x9098efe2419178c1, 0x1, 0x2, '\x00', 0x3f}, 0x1, [0x5, 0x4, 0x9, 0x6, 0x8, 0x1f, 0x400, 0x3, 0xffffffff, 0x3, 0x9, 0x1, 0x40, 0x4, 0x7fffffff, 0x6, 0xffffffffffffffc0, 0x80000001, 0x10000, 0x523740f3, 0x9, 0x8, 0x3f, 0xfffffffffffffffb, 0x3, 0x9, 0x0, 0x3, 0xbb, 0x6, 0x9, 0x200, 0xe2d, 0x10001, 0x0, 0x800, 0x3, 0x9, 0x8, 0x20, 0x6, 0x3, 0x7524142d, 0x2, 0x4a6, 0x55a, 0x360, 0x8, 0x8ab6, 0x100, 0x80000001, 0x4fbe5576, 0x8, 0xa871, 0x9, 0x5, 0xfffffffffffffffe, 0x7f, 0x4, 0x1, 0xffffffffffff1c69, 0x4, 0x3, 0x5, 0x2, 0x5, 0x8, 0x454, 0xff, 0x1, 0x8, 0x20, 0x3ff, 0x7, 0x6, 0xfffffffffffffffc, 0x65160b0f, 0x784c3d0, 0x1, 0x81, 0x6, 0x7, 0x0, 0x1, 0x81, 0x9, 0x100000001, 0x20000000, 0x80000001, 0x1, 0x3cde, 0x2, 0x8, 0x9, 0x5, 0x0, 0xfff, 0x3, 0xe64, 0x7fffffff, 0x0, 0x101, 0x0, 0x400, 0x7fffffff, 0x4, 0xa7, 0x4, 0x60000000000, 0x2, 0xff, 0x0, 0x4, 0x1, 0x8, 0x1, 0x8, 0xff, 0x648c3737, 0x80000001, 0x2, 0x1, 0x0, 0x40, 0xfef, 0x8, 0x2, 0xfff], {0x0, 0x989680}}) 13:55:26 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaac2b31dec2e80886394a7030000e884081dc1b340b46426db250a81db911c695fecd06c8c9fd523fad4f564342a5321c69b2146f15aa9dad595c9956c2be26b90101aff3a765c264adfe8f2744300968cb0034fdf0e0775956af5ad49fe8b26a4b6938867dcbd917b957d97e4809392c2783e76d7e0de3f8acd8fa1ef336c1a9ce70f26b2735da51ba714a55f927fcd9abf8285415ffefa382ac98d4186633ecfa8f2d51544f1e3b4a8dc149f0a4e5bed45d254845bfffb4892110b061810997eb0eed51752f0984c64686fba440e2f911151b68bd68b16658a3a7fe7594ac6b0471eec606c69456aba53"], 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) ioctl$FBIOBLANK(r5, 0x4611, 0x3) dup2(r3, r4) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x474640, 0x0) ioctl$EVIOCSABS2F(r7, 0x401845ef, &(0x7f00000002c0)={0x6, 0xc69, 0x800, 0x800, 0x800, 0xffff7fff}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f0000000000)={0x0, 0x0, 0x201f, 0x8, 0x7f, {0x8, 0x9}, 0x1}) 13:55:26 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)}], 0x1}, 0x0) 13:55:26 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)}], 0x1}, 0x0) 13:55:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6}, 0xffffffffffffff7c) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x6a4000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="01fb8e029879b389", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r3, 0x1ff}, &(0x7f00000000c0)=0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7ffffffffffffffa) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x40000, 0x0) write$apparmor_current(r4, &(0x7f00000001c0)=@hat={'permhat ', 0x1, 0x5e, ['\x00', '/dev/vga_arbiter\x00', '/dev/vga_arbiter\x00', 'ppp1)\x00', '\xc5{self\\selinux\x9a\x00', '/dev/vga_arbiter\x00', 'bdev]\x00', '/dev/ashmem\x00']}, 0x77) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000240), 0x10) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 13:55:26 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_emit_ethernet(0x14, &(0x7f0000000040)={@local, @random="c2b31dec2e80", [], {@generic={0x8863, "94a7030000e8"}}}, 0x0) 13:55:26 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000240)=@md5={0x1, "66c785729a4b916812d2369c1b8f5bdb"}, 0x11, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) write$9p(r1, &(0x7f0000000040)="192376fe55eee374667880c377fa5239a625a398e629fdfeecd773a20eee09d2aaf78bb3370e6f7c688ea2562ab788981f74ffe97c308bdccc72b6e196689dc95e476ca42c7878f49e9fda2a519e9cdda02f442e7b0707fe1e37c5404ba3537eeb1a6f4ad55be292278a00ff6d0ba6b9f3", 0x71) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x4, 0x0, {0x1}}, 0x28) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x3f, 0x9}]}, 0xc, 0x2) 13:55:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000240)=0x4, 0x4) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@multicast2}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 13:55:27 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)}], 0x1}, 0x0) [ 711.286565] memory commitment underflow [ 711.286684] ------------[ cut here ]------------ [ 711.295716] WARNING: CPU: 0 PID: 19297 at mm/util.c:604 __vm_enough_memory.cold+0x18/0x58 [ 711.304030] Kernel panic - not syncing: panic_on_warn set ... [ 711.304030] [ 711.311400] CPU: 0 PID: 19297 Comm: udevd Not tainted 4.14.158-syzkaller #0 [ 711.318504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.327860] Call Trace: [ 711.330459] dump_stack+0x142/0x197 [ 711.334122] panic+0x1f9/0x42d [ 711.337319] ? add_taint.cold+0x16/0x16 [ 711.341303] ? __vm_enough_memory.cold+0x18/0x58 [ 711.346068] ? __vm_enough_memory.cold+0x18/0x58 [ 711.350825] __warn.cold+0x2f/0x2f [ 711.354403] ? ist_end_non_atomic+0x10/0x10 [ 711.358730] ? __vm_enough_memory.cold+0x18/0x58 [ 711.363493] report_bug+0x216/0x254 [ 711.367264] do_error_trap+0x1bb/0x310 [ 711.371162] ? math_error+0x360/0x360 [ 711.374971] ? __down_trylock_console_sem+0x12c/0x200 [ 711.380168] ? vprintk_emit+0x171/0x600 [ 711.384153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.389003] do_invalid_op+0x1b/0x20 [ 711.392724] invalid_op+0x1b/0x40 [ 711.396206] RIP: 0010:__vm_enough_memory.cold+0x18/0x58 [ 711.401567] RSP: 0018:ffff888066befb70 EFLAGS: 00010286 [ 711.406932] RAX: 000000000000001b RBX: 0000000000000001 RCX: 0000000000000000 [ 711.414209] RDX: 0000000000000000 RSI: ffff888054128c90 RDI: ffffed100cd7df64 [ 711.421482] RBP: ffff888066befba8 R08: 000000000000001b R09: ffff888054128cb0 [ 711.428754] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 711.436027] R13: ffff88808ae62000 R14: ffffffff87ffdca0 R15: fff8000000044fbf [ 711.443437] security_vm_enough_memory_mm+0x93/0xb0 [ 711.448473] copy_process.part.0+0x453f/0x6a70 [ 711.453180] ? __cleanup_sighand+0x50/0x50 [ 711.457526] ? __fd_install+0x236/0x5f0 [ 711.461516] _do_fork+0x19e/0xce0 [ 711.464981] ? fork_idle+0x280/0x280 [ 711.468709] ? fd_install+0x4d/0x60 [ 711.472337] ? SyS_pipe2+0x7b/0x120 [ 711.475967] ? do_pipe_flags+0x120/0x120 [ 711.480039] SyS_clone+0x37/0x50 [ 711.483406] ? sys_vfork+0x30/0x30 [ 711.487124] do_syscall_64+0x1e8/0x640 [ 711.491019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.495877] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 711.501068] RIP: 0033:0x7f7f51baff46 [ 711.504778] RSP: 002b:00007ffc107f07e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 711.512603] RAX: ffffffffffffffda RBX: 00007ffc107f07e0 RCX: 00007f7f51baff46 [ 711.519880] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 711.527157] RBP: 00007ffc107f0840 R08: 0000000000004b61 R09: 0000000000004b61 [ 711.534467] R10: 00007f7f524cca70 R11: 0000000000000246 R12: 0000000000000000 [ 711.544274] R13: 00007ffc107f0800 R14: 0000000000000005 R15: 0000000000000005 [ 711.553622] Kernel Offset: disabled [ 711.558543] Rebooting in 86400 seconds..