'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 718.637107] audit: type=1400 audit(1556724840.207:13594): avc: denied { map } for pid=21078 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:01 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 15:34:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 15:34:02 executing program 0 (fault-call:4 fault-nth:0): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:02 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x600003, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x1ff, 0x2, 0xb3b, 0x3, 0x3, 0x5, 0x3f, <r1=>0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYBLOB="00040a00080cfe0107018000800087ca7c0e04662bad2e41ca26617f80059a007f9e392da13a"], &(0x7f00000001c0)=0x1c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r1, 0x6, 0x3}, 0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1cd80, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0xf) ioctl(r3, 0x8000, &(0x7f00000002c0)="de541f09b4caee9325bf644036326b19145050b138cd4f03cf02b9c23cef3878bb0feed48abe677c98761385a7f4580df9d6c77f495d9b24d8c6cc1649a2bf10063beb17639ff9fb749cfd241f0c10a3d975ac8223b4e116883c90450f02f619be577e10bda6d63a5b3e5117ecbaa9c896c98adb19f555630bb436b97497d23f8c969c7d6b1cd4") r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000400)={0x1, 0x1000}) 15:34:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 15:34:02 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, <r4=>0x0}) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="464abcd26cc39a99274190dc9af1587912be6c2f7761f40aa474d9d80ca1d77823d66e99c4287ba8c73a03ecb8fae23bc2025e80999dfaff789c64b72d71b8cca2e023d8bcc3721f9b2b24b8c06ef4cb2e30e2a792c79b9231be1dc0b05f51ba3f47ad16b2129ab097e51666853d967f92eb5d9900da5993f911a02a39090ab029d5d56b103bab1df8399b2abb13e09be8cb986a21", 0x95, 0xfffffffffffffff7}, {&(0x7f0000000480)="30416ba47967dbf07d30952fb1d22b09fd10370744101f97ab06c2400fe00e78db4e864f042190e0d3c0f89e9a3aa47f9ce64e98c036d9153cb8b239bdeceb5c6d91efaefdcfbcc37abd6b0ddc4f5521261dcb7bee87800aab6c5221c91d59441ca0a9ce523eaa635cf6217a37c6789f32f3ff8f5184fc38e596b148a0a7147c70f977d7f5440082f02e4a9fdf875f1cc5541f8e692d07c1e8c4b785f007f3bd33bb9699c80c0bc0ec8065ba", 0xac, 0x1}], 0x8, &(0x7f00000008c0)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r3}}, {@errors_recover='errors=recover'}, {@umask={'umask', 0x3d, 0x8000}}, {@gid={'gid', 0x3d, r4}}, {@case_sensitive_no='case_sensitive=no'}, {@disable_sparse_no='disable_sparse=no'}, {@gid={'gid', 0x3d, r4}}, {@umask={'umask', 0x3d, 0x8001}}], [{@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_access\x00'}}, {@smackfsroot={'smackfsroot'}}, {@smackfsroot={'smackfsroot', 0x3d, '^!'}}, {@euid_lt={'euid<', r3}}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="04000000002000020000606e2af761ce6f05000000000000"], 0x1, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, <r5=>0x0}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000540)={{0xffffffff, 0x0, 0x0, 0xb04f}, 'syz1\x00', 0x3d}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d3b6f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69af54eaa68e14c6fbfbe3ac3e872dfc5f00cb06b1895277bd5a0ee49d5afda717d3f832db5751595ba1c40953940d35df8b0b4c69f154755e491055d9b913ac22cd97ce4fcdceb2ac005d175ada3ae6bb599efc6c14973f7ebfb7ef0e33a70cd8b2a73babfb5c251d0153c78dfa5ab261b21220a920b856ec90ff422e8f9e617a0d56e11918ec0d00c396f265bb3544949c45c56198791c3a40d67b412194c19bfd8ce116d5b67e88600d268", @ANYRESDEC=0x0]) mount$bpf(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='bpf\x00', 0x600a, &(0x7f0000000a00)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x101}}], [{@smackfsroot={'smackfsroot'}}, {@obj_type={'obj_type', 0x3d, 'system.posix_acl_access\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@subj_role={'subj_role', 0x3d, '127.0.0.1\x00'}}, {@obj_type={'obj_type', 0x3d, 'disable_sparse=no'}}, {@euid_lt={'euid<', r5}}, {@euid_gt={'euid>', r3}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r5}}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) socket$inet_udp(0x2, 0x2, 0x0) 15:34:02 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="390000001400810c00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b45b000000000000000000000000000000000000c0", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x10000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 15:34:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x12, &(0x7f0000000080)=r3, 0x4) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 719.797379] FAULT_INJECTION: forcing a failure. [ 719.797379] name failslab, interval 1, probability 0, space 0, times 0 [ 719.851718] CPU: 0 PID: 21151 Comm: syz-executor.0 Not tainted 4.14.114 #4 [ 719.858781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.868145] Call Trace: [ 719.870778] dump_stack+0x138/0x19c [ 719.874425] should_fail.cold+0x10f/0x159 [ 719.878685] should_failslab+0xdb/0x130 [ 719.882670] __kmalloc+0x2f3/0x7a0 [ 719.886223] ? __lock_acquire+0x5f9/0x45e0 [ 719.890475] ? rw_copy_check_uvector+0x1d8/0x290 [ 719.895259] rw_copy_check_uvector+0x1d8/0x290 [ 719.899875] import_iovec+0xa2/0x370 [ 719.903605] ? dup_iter+0x260/0x260 [ 719.907252] ? save_trace+0x290/0x290 [ 719.911054] ? proc_fail_nth_write+0x7d/0x180 [ 719.911069] vfs_readv+0xb3/0x130 [ 719.911081] ? compat_rw_copy_check_uvector+0x310/0x310 [ 719.911100] ? lock_downgrade+0x6e0/0x6e0 [ 719.928832] ? __fget+0x237/0x370 [ 719.932324] ? __fget_light+0x172/0x1f0 [ 719.936846] do_preadv+0x15d/0x200 [ 719.940406] ? do_readv+0x220/0x220 [ 719.946094] ? SyS_writev+0x30/0x30 [ 719.949737] SyS_preadv+0x31/0x40 [ 719.953210] do_syscall_64+0x1eb/0x630 [ 719.957113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.961978] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 719.961989] RIP: 0033:0x458da9 [ 719.961994] RSP: 002b:00007ff06c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 719.962005] RAX: ffffffffffffffda RBX: 00007ff06c899c90 RCX: 0000000000458da9 [ 719.962011] RDX: 00000000000001be RSI: 00000000200017c0 RDI: 0000000000000004 [ 719.962018] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.962024] R10: 0000000000000700 R11: 0000000000000246 R12: 00007ff06c89a6d4 [ 719.962030] R13: 00000000004c5afc R14: 00000000004d9e48 R15: 0000000000000005 15:34:03 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x480080, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0xffff, 0x3, 0x153169c7, 0x8000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000100)={0x5, 0x0, [{0x7, 0x3f, 0x7, 0x7fffffff, 0x80000001, 0xfffffffeffffffff, 0x6}, {0xf, 0xaff4, 0x1, 0x684, 0x9, 0x3, 0x1}, {0xd, 0x6, 0x1, 0x5, 0x2, 0x4, 0x10001}, {0x6, 0x401, 0x4, 0x4, 0x7617, 0xe9e0, 0x5}, {0x7, 0x2, 0x2, 0x7, 0x3, 0x357, 0x6}]}) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@default) ioctl$FICLONE(r0, 0x40049409, r0) 15:34:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x1, 0x20000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000600)={0x0, {0x7ff, 0x7fff}}) r3 = syz_open_procfs(r1, &(0x7f0000000080)='net/netstat\x00') r4 = getuid() syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000200)="fd32fd8c9c4c09648eeff6e3f4f72f70d87eadd02776300cd2bc2457bfd12468209197cd90eb7c6e8c2d421b7193c40788b06cf36c364a32e7a7c8895a4ad76ec95237441b77e288234cf28e896922cb34d103546b8075942716a927674721fe49f695dd87c3ecbbd191de4136d76e965e0b0b97399567ab4d5587995d032476514d101b0cb177f01f08adc5974d27b93420bbe02cd7569dbfe8d6618240d06d249d836cf0cb8a9dcda2f2d3ebbf3ff4f1b026c1cac32a", 0xb7, 0x2}, {&(0x7f00000002c0)="f9bfafd8ebd99dcc7cafeea469ea", 0xe, 0x1ff}, {&(0x7f0000000300)="6ab0d5dae183d5e0716f76be16e4359ca882888977211551a64318daa74dc4569204ffea222a07251e6934614af83b4040209a7a2b72c28f5dc1ad79e760ec996d4cbc79db8205e2aa46945029d828200a564dbebf44568e5cfdb30609a14985db3c6a02", 0x64, 0x5}, {&(0x7f0000000380)="202be0470c66e752dc0857020155e963e58c4cbeff3c681152750523a9a92f66f6263cc33bc6e795a0228fb24622159d36d85b9262d6a9dea37fb79b603975e0da4780b5e86d6e3e98d33f0d3e43513683b84ec2450f1991b55d3dc4cd52d79b9f3cce4406037dc798630d3e3efe9e1724eb94bdcdad729a685a916234805d0b7b4df375002f5b9a139bbd23000e0c0b1e916807e803e5e0618f9f01ef5b51cac56a934104e24b24718c9852ada9e51e013cb61342e2e7f2f12041c859ec6165e3adbff5753f4671f14138baf1b23cad211515f26b851f3319cddc42b754af632990e44fb0f7146f47928d783ff9a164a0eeee7c58e2f300f6ace816", 0xfc, 0x5}], 0x800020, &(0x7f0000000500)={[{@resize_auto='resize=auto'}, {@acl='acl'}, {@hash_r5='hash=r5'}, {@conv='conv'}, {@balloc_noborder='block-allocator=noborder'}], [{@euid_gt={'euid>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x3f, 0x39, 0x37, 0x77, 0x39, 0x39, 0x77, 0x65], 0x2d, [0x63, 0x34, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x79, 0x67], 0x2d, [0xfc3c766ce5287548, 0x77, 0x77, 0x7f], 0x2d, [0x37, 0x999bb217ce218052, 0x77, 0x76, 0x64, 0x7d, 0x75, 0x77]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0xdc, 0x4, [], &(0x7f0000000100)=0x40}) 15:34:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x3ffffffffffffffc, 0x100) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x12c, r1, 0x820, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x128}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x811}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb797}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8c2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xe0}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x72}]}]}, 0x12c}}, 0x90) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f00000001c0)=0x8000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr(r2, &(0x7f0000000440)=@random={'osx.', '\x00'}, &(0x7f0000000480)='\x00self\xedproc\x00', 0xb, 0x2) ioctl(r2, 0x3, &(0x7f0000000180)="0aed3a93b9e09272dc1b123c123f319bd070") syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_execute_func(&(0x7f0000000000)="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") 15:34:03 executing program 0 (fault-call:4 fault-nth:1): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:03 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x0) clone(0x3ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [{}, {}]}, 0x123, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2e) creat(&(0x7f0000000680)='./file0\x00', 0x0) 15:34:03 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x6, 0x3, 0xff}, 0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000200)='./file0\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 15:34:03 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 720.870142] net_ratelimit: 20 callbacks suppressed [ 720.870148] protocol 88fb is buggy, dev hsr_slave_0 [ 720.880229] protocol 88fb is buggy, dev hsr_slave_1 15:34:03 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x12, &(0x7f0000000080)=r3, 0x4) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 721.030126] protocol 88fb is buggy, dev hsr_slave_0 [ 721.035340] protocol 88fb is buggy, dev hsr_slave_1 15:34:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101280, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 721.110156] protocol 88fb is buggy, dev hsr_slave_0 [ 721.115944] protocol 88fb is buggy, dev hsr_slave_1 15:34:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000000cc9917e1ba4c4970e8d0a66c2dc1e115c60618436ff4e82d3f5f06ffdb33bf9fffec3f9cff7173d765350", @ANYRES16=r1, @ANYBLOB="010128bd7000fbdbdf2501000000000000000b000000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x400, 0x404003) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:34:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) mq_notify(r1, &(0x7f0000000100)={0x0, 0x12, 0x4, @tid=r2}) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x80) 15:34:04 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000040)=0x14) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000100)=0xb37, 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:04 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000340), 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0x6, "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", 0x2, 0xbd, 0x2, 0x4, 0xb0b5, 0x0, 0x3}}}, 0x128) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x120}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x104, r3, 0x217, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffd664}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DEST={0x68, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x17}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 15:34:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0xfffffffffffffe75, 0x0, 0xfffffffffffffe63}}], 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x4e20, 0x7, 0x4e23, 0x0, 0xa, 0x0, 0x80, 0x2f, 0x0, r2}, {0x20b, 0x4, 0x2, 0x400, 0x8, 0x7fffffff, 0x9, 0x4}, {0x100000000, 0x80000001, 0x7, 0x80000000}, 0x9, 0x0, 0x0, 0x1, 0x2, 0x1}, {{@in=@multicast2, 0x4d2, 0x3c}, 0x2, @in6=@empty, 0x3506, 0x1, 0x0, 0x7, 0x7, 0x7, 0x6}}, 0xe8) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x3) 15:34:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f000000c080)=[{{0x0, 0xffffffffffffff52, &(0x7f0000007e80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x163}, {&(0x7f0000007d80)=""/230, 0xe6}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x3fffffffffffe07, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=<r1=>0x0) rt_sigqueueinfo(r1, 0x3d, &(0x7f0000000040)={0x6, 0x6, 0x100}) 15:34:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000001c0)) r2 = accept4(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000100)=0x80, 0x80000) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) [ 721.990143] protocol 88fb is buggy, dev hsr_slave_0 [ 721.995287] protocol 88fb is buggy, dev hsr_slave_1 15:34:05 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x682) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x6) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2286, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 722.105475] kauditd_printk_skb: 202 callbacks suppressed [ 722.105485] audit: type=1400 audit(1556724845.027:13797): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 722.264509] audit: type=1400 audit(1556724845.077:13798): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 722.454417] audit: type=1400 audit(1556724845.077:13799): avc: denied { map } for pid=21213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 722.480808] protocol 88fb is buggy, dev hsr_slave_0 [ 722.486438] protocol 88fb is buggy, dev hsr_slave_1 15:34:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={<r3=>0xffffffffffffffff}, 0x106, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000480)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000140)={0x1, {0x77359400}, 0xb8}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000200)={0x7ffffffe}, 0x4) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 722.651273] audit: type=1400 audit(1556724845.077:13800): avc: denied { map } for pid=21213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/204) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) 15:34:05 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, 0x0, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x7, 0x6) [ 722.860709] audit: type=1400 audit(1556724845.077:13801): avc: denied { map } for pid=21213 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:05 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0xfd8a) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000200)={0x9, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendmsg$alg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x30, 0x117, 0x2, 0x15, "6a2217b426b73a167de1e4018b94d2d13b7e68efb3"}], 0x60, 0x20044010}, 0x40) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x800, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)=<r4=>0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000300)={[], 0x3ff, 0xffffffffffffff01, 0x9, 0x7fff, 0x7fff, r4}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='rose0\x00', 0x298) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r3, r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000180)={0x4, 0xffffffffffffffff, 0x6, 0x0, 0x1e}) 15:34:05 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000240)=0xc) socket$netlink(0x10, 0x3, 0x80000000004) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) epoll_create1(0x8000080000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r3 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="a3ee6135a6891c6ac13e1d946d388a875db1aa775114b730a3a95c394e1feb259fc46b56ea81a3b5d006b92aae989af463c9941c1ab0de00000000b6fed08cd06c7c3f9d6d4b6fbbbd78434e6d2a66e243f6d3bb1f26a474c1cddb266efe3b00bad9aaae588c509249a2e2dd2db02d556dd47732f3df7cb504b40df257a61e578f2600"/142], 0x1}}, 0x44801) sendto$inet(0xffffffffffffffff, &(0x7f0000000400)="1c554cf8b93687aab173d8032491f239015b84dcb4678ad1d63110fe50", 0x1d, 0x40, 0x0, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r4, 0x0, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}}, 0x24044001) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x0, 0x0) [ 723.060283] audit: type=1400 audit(1556724845.077:13802): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.180952] audit: type=1400 audit(1556724845.077:13803): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:06 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 15:34:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x2, 0x0) timerfd_gettime(r1, &(0x7f0000000140)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:34:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0xffffffffffffffff}, 0x18) [ 723.393447] audit: type=1400 audit(1556724845.077:13804): avc: denied { map } for pid=21213 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.552466] audit: audit_backlog=65 > audit_backlog_limit=64 [ 723.567184] audit: audit_backlog=65 > audit_backlog_limit=64 15:34:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10401) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:06 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0xffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x8000, 0x0) r4 = syz_open_dev$vivid(&(0x7f0000000280)='/dev/video#\x00', 0x1, 0x2) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000002c0)={r3, r4, 0xff}) syz_emit_ethernet(0x46, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60162f0000100000ff47443a0c4e0cc4ee000000000000010000000000000000000000eaffffffffffffff0004019078003a997d00be8999"], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, <r5=>0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r5, 0x4028641b, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x72eb80e, 0x4, 0xc4, &(0x7f0000ffd000/0x3000)=nil, 0x101}) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={<r7=>0x0, 0x80000}) r8 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x2c4000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000140)={r7, 0x80000, r8}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x4921, 0x9, &(0x7f0000000a40)=[{&(0x7f00000003c0)="9dec25393fd5cfedd6475ce08f0a689d5c1a57f0fc4e96ee82847d653638201a3df321593fd055f9f516ee14ed9d51f4400ee581950c6d0c5e23ac6968f65edea76e826ba6ba94e7f0eac2b8b122c8facd1b90fd2c7cc353db5c6b4faee80971fca487431c1205a4dc949dcd61af7f266ac90d65276a3b598b17c154fcd08217900c24252824919e5f7b637709ff528c852d13de25cc16644bdac4467816506dda", 0xa1}, {&(0x7f0000000480)="a26074c261958f5a8d6814bdb28b78c80d265bb1fd29306cb8c74adcb68cd1b025cac7a9a692aa367023fa6995598f4ebcd04cc8f7cd318e7e47fc4a1c80208ab13138a92e80ca4ffcb774e25bea26309e1f30f72604e9b603c7066deaa71d019a0a81f5ba23e36b1cad648858193498d2ef8c98efe9442693072f87d7aa26dba8b9dc0ed194e7a7fc69aae52e1e74068ec1de60a1052cf6712f09288dc4a4ae", 0xa0, 0x4}, {&(0x7f0000000540)="d067f5f549d63144fd39cca8f5da18c48949b5faf3ca203f5aa9176429c7dfc6402acee99752f9c46794201f9a5984f12168b62af3604148948fd75f9d65d087b9b2efc8bb6a10b8a0fd493d6a1d2754e29675a1a078e5d8fec6b910f7208936952faf99d7a72e959c90ba1d6c920681", 0x70, 0x1}, {&(0x7f00000005c0)="788d761bb37c095677647ef4306022c381ef577600b966d2d463710c541bf18ae9ac9abefbf5eefec50ab7e83736d8570da2f6d1a46124f0704cc51e2896337f838abe74f6eb2957bcf62734ce3bb24a3a9e2661d3e5eec43e99910e24ca372b1f91308df302235f10fcfbf270521d484d479342e0d4cefbc0fe02d6f1ad884e1ce0b74d5c5aec004e187412e487506f719fec52200ef4e2dc0dbc8c2e341ea61e1b4496ad380043b521a4a1a5f741600ec2df277d9a62e7fa04344c272868a7f2b97d83350c38aa78312f4e37c0ffcd", 0xd0, 0xde}, {&(0x7f00000006c0)="2f28355b6e75fff7a88abf02ee8de52221fd2773ce1c3c39b35b3209bfe02afa333ab7f3b5eaacd272302e887f1c112cec2bbc63d136782903a43770b04d8b6d0770a2195884b461e06abaed0ab8b85e5a9185eb79e708ef35875f04730b3f6ca027d725e290e2f8b0036b9406f7b34afeb4d9dbdb21ac4890b11926f31459c475be711084c884fa6068ee0b7a7799fbaebd8c78ba23c77adb617d56eacf54ed8e44f73d8dd23ed2fe79cbeb0e5499", 0xaf, 0x7}, {&(0x7f0000000780)="ae7eba00e845825ed5b652e07b80cf2e6d710ba96d47da31d74df8bb2115874e533ef10ad02e9c2145694828d3297da1673cb67bbb354f2f498ef76dde315647dcad807a5be3d71264a1ea603977c584a47cffe778501102049417241e7f32a0bafc307533b5dc07516f6cd6f81a3dee5c96e3cbbf5cd09fa66a2501244f45afae1467934fc8e1030d3295a256afc3137f0cb9db03d5d6", 0x97, 0x2}, {&(0x7f0000000840)="84683c545f2aa7250a320c9bf5cf3325635fbf07b6ee985725fc42d59c50c1afcd11267e886b20d7260c7814f9fc5ea518ac9939beac64962f4a8bbe4369eed233484a7351d769a7714c4cfd6dbb11a76a440c73149a5c7345e9955fa5", 0x5d, 0xe3}, {&(0x7f00000008c0)="1d2d10ffc5e510dbde0cedcc1b393c2ff7d46fda1bcbde86afb73319690b986d7d53369f6f71df07e0eb4db26de46f7ffdd351fb3141653b992547c5efafcff85c8f044aef4891ce5f8bb9a463bd65ced7b6cfd7617d15fd45c1c734f5446852078645f4df1251a353539ed8bed540c7226bb620bd73140d7cef5c9efd1e750b495abeb79aab9f71294cb7eda16791eac85c018b7c3e62e3da16af916226c4f51ccb6a9930046d5653a8d3835fe4df1f2c96b2f0552e981c430242a0997363e8f857374ff7750f534377997ae398afb6", 0xd0, 0x10000}, {&(0x7f00000009c0)="30dc91d59cddf61d14e3bbb7932fe6824656e7aa2bde0cc573602aaaa68ff2a68b8f733341fb749ed07e855535877d9c5ebff8dc91e335642425c349c39aeab6ba2e9914abea5555eae9c99f908a5097347fb714ca738778f7cbd09a1e2e6b", 0x5f, 0x6}], 0x10000, &(0x7f0000000c80)={[{@session={'session', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@uid_gt={'uid>', r9}}]}) 15:34:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x800) prctl$PR_SET_TSC(0x1a, 0x1) sendto$rose(r1, &(0x7f00000000c0)="2156ab9a961f6c9d6de9ee058a2501a79fa6ae8f7b238c1369898e02e228172dfbabf2dd802261cc72a7b2897af52bc3fe074f626daa6fa95ac182aadaf4707e67fc4b4bac8eae1b30740af74d013ef738c05004b59faabcc173ee9d2ab60fcff96d032764b3a2908d1518ece01417ca0ea55a7a284d6d7fd850c63f58951c73b4db847885706ed8e76656e4b44760ed44", 0x91, 0x800, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x79, 0x600000000000000, [0x48], [0xc2]}) 15:34:07 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4400000000000001, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x303) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x40000000000016b, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9a0d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x200, 0x4) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 15:34:07 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)={<r2=>0x0, 0x9}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r2, 0x10000}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r2, 0x8}, 0x8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000980)) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x101, 0x6, &(0x7f00000007c0)=[{&(0x7f0000000340)="1a10411b68d66239615849c50c197929bdf94c2b00ff5ef11d8e33420bb0f9ced18a1b5e32a761d69f0bc2ed872ef127b724341b59c5098f1ab39405011bc9f966ce26ccdf7a9baf61b1eea14142b3ba5a8f4f1432fc503509e42cff9f426302c84ef2bcfba33b6947aeeec798cb558ae8cb6a5751a8a7e6b9d50bdb626360951a40ad2b0865683fca8bb78e053f140420574316985ff4168d328a23c40b06d8f47e7dfb6505c19d1a0127421224eadae21113ff", 0xb4, 0x4}, {&(0x7f0000000400)="ff7c78648862cd7e96fbbb0b7e4d58452e6ed25eb3ae4705c60c7efbd3c989a4d18fb7cb49087ddf9822a9f90abfc1c66b06c398ed8a648de8bd7420a705ffd2384695a589cd2a5c2a41fed54126d37b1bd9c1ca583c430769026d48c75d6eea37101a7f092d9b5184451141c236c3379a34349da0864fd200af3d4272ab27d4db0f68aeb3b58e7c43bfec72029681a3ead2dfc1cb7b0721b7ed35253546801e8c0f2a30b9458091f6b4d9ab", 0xac}, {&(0x7f00000004c0)="d166e5f0651fb7a79618ea6a10bb3a3f7edf05def62e5659f809536444b43624e50b700eb02c9304", 0x28, 0x8}, {&(0x7f0000000500)="794a0b5222953a4e59b0f8cc2cdd46e438faa402aa8d4df4d208e902cea4b7d0283dd6bbf628dd0d823abc03dc372bd7cc3fa4e0f7eaf14ad63f8404bec71e15d5294267f5a7f30b8d76376b196ee7f9a2347029748ef682abc1916fc3c1a16bba53ce26b414cdbf5e8a069294a71cd389e8fe8a07588c94015a080b0800cf5ba43ffa137de0956428ff51c800e699fa76da0bdeebd9bc5c974f2561822df33979db62f08e84ef92eac357a21f647166ea14989920d7b5aec00c321fc7f2", 0xbe, 0x1}, {&(0x7f00000005c0)="23898d4f6e868d8f452aa58854eeb391ac91f612cac96ee46f7cf062f7a3f1014f98c6187e3624ac5798e92b67350439fa4ff360e912bce86945d0001e4cda96da90a62eb41265dafa7b157234a59ba136c8379f8ebaddf82c7d88473bc2f2f56789f12f3c5098f0963c8225b326a2254e7a85b468f3910fb8998f38615ae48e23f356b2160910bb4ccd5e2ad9499aab0b4053ffa3036af63c33f3007a28efa76ff3fb4349dc939605d4c5559535df39b3f1ac013919cf3f9323953812", 0xbd, 0x8000}, {&(0x7f0000000680)="6151366fa2b957ed421944ed145ffcc9db6dd17650c6bfe288bd83fb6655a20fe628ee33b7d16666c67d774263b391c8567558aa060c74e1c3f64a18b3830233069ae2cbb402ffd11fe42726f7d617ccf577c75544259181890416f1a337d5008ca57fa4b08d037df2c302ffd5098b2a5df888670097df1cc4817db93c66627f945fd23c2591cc9a54fb4dc8c6cb64fb9283660aa6452b7a252d97eba1e37e3fe74e3895a55aae20", 0xa8, 0x7fff}], 0x400, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6e6c733d63703433372c7569643d0717c173e7bd3df6076b6befd4ddf242b7fae82a8724846629704c44cbfcbfe2ea0c4f7a8a9768e34954cb198537e95716b406a728e711d2a8c959ee0ba08d1adb4a36a0edb9245dfe922c34ef0afee91c82df1a0e8c0d3b066a3d70f3fd124e007a8c4ff628dfccdc11c1cc1f30706d62c17289f35d3783b999b81d8ceff30c77b394e998602d49c16aee511530783c9c362c7a4898814686510ae3ba6da8587885db183552f18ad8ad", @ANYRESHEX=r3, @ANYBLOB=',errors=continue,fmask=00000000000000000000777,fmask=00000000000037777777777,errors=continue,fscontext=user_u,\x00']) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 15:34:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x3000010, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532302c6163636573733d636c69656e742c63616368657461673d2c70726976706f72742c6e6f657874656e642c6163636573733d757365722c63616368653d817363616368652c736d61636b6673686e743d2c586f6e745f6d896173758f652c666f776e65723c5f290915e5bc3160a6e49fa53a5deb391ab8c143bbde07a5cea7de9fc860a3830f0d2158205a91d2d39ba74d6f6519fe86d8c6", @ANYRESDEC=r1, @ANYBLOB=',permit_directio,dont_measure,seclabel,defcontex~=unconfined_u,\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:07 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000002780)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000027c0)=0x100000) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x7ffc, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") fsetxattr$security_smack_transmute(r2, &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000440)='TRUE', 0x4, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000180)={0x5, [0x0, 0x0, 0x0, <r4=>0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={<r5=>0x0, 0x8001}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x6, 0x3, 0x0, 0x7ff, 0x1000, 0x0, 0x3691, {r5, @in6={{0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x9}}, 0xf6, 0x4, 0xffff, 0x738f, 0x7}}, &(0x7f00000003c0)=0xb0) syz_execute_func(&(0x7f0000000000)="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") 15:34:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f00000053c0)=[{{&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)=""/148, 0x94}, {&(0x7f0000000140)=""/17, 0x11}], 0x2, &(0x7f00000002c0)=""/4, 0x4}, 0xd9}, {{&(0x7f0000000300)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/103, 0x67}], 0x2, &(0x7f00000004c0)=""/59, 0x3b}, 0x100}, {{&(0x7f0000000500)=@l2, 0x80, &(0x7f00000027c0)=[{&(0x7f0000000580)=""/6, 0x6}, {&(0x7f00000005c0)=""/121, 0x79}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/218, 0xda}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/6, 0x6}], 0x7, &(0x7f0000003180)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000002840)=@nfc_llcp, 0x80, &(0x7f0000002b00)=[{&(0x7f00000028c0)=""/169, 0xa9}, {&(0x7f0000002980)=""/100, 0x64}, {&(0x7f0000002a00)=""/200, 0xc8}], 0x3, &(0x7f0000002b40)=""/86, 0x56}, 0x2}, {{&(0x7f0000002bc0)=@tipc=@name, 0x80, &(0x7f0000004280)=[{&(0x7f0000002c40)=""/57, 0x39}, {&(0x7f0000002c80)=""/153, 0x99}, {&(0x7f0000002d40)=""/97, 0x61}, {&(0x7f0000002dc0)=""/140, 0x8c}, {&(0x7f0000002e80)=""/31, 0x1f}, {&(0x7f0000002ec0)=""/13, 0xd}, {&(0x7f0000002f00)=""/130, 0x82}, {&(0x7f0000002fc0)=""/131, 0x83}, {&(0x7f0000003080)=""/72, 0x48}, {&(0x7f0000004180)=""/220, 0xdc}], 0xa, &(0x7f0000004340)=""/191, 0xbf}, 0x1f}, {{&(0x7f0000004400)=@x25={0x9, @remote}, 0x80, &(0x7f0000003100)=[{&(0x7f0000004480)=""/250, 0xfa}, {&(0x7f0000004580)=""/103, 0x67}], 0x2, &(0x7f0000004600)=""/15, 0xf}, 0x7}, {{&(0x7f0000004640)=@generic, 0x80, &(0x7f0000004780)=[{&(0x7f00000046c0)=""/162, 0xa2}], 0x1}, 0x7}, {{0x0, 0x0, &(0x7f00000047c0), 0x0, &(0x7f0000004800)=""/56, 0x38}, 0x4}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004840)=""/205, 0xcd}, {&(0x7f0000004940)=""/194, 0xc2}, {&(0x7f0000004a40)=""/229, 0xe5}, {&(0x7f0000004b40)=""/104, 0x68}, {&(0x7f0000004bc0)=""/200, 0xc8}, {&(0x7f0000004cc0)=""/245, 0xf5}, {&(0x7f0000004dc0)=""/146, 0x92}], 0x7, &(0x7f0000004f00)=""/204, 0xcc}, 0x7dc3}, {{&(0x7f0000005000)=@isdn, 0x80, &(0x7f0000005340)=[{&(0x7f0000005080)=""/168, 0xa8}, {&(0x7f0000005140)=""/79, 0x4f}, {&(0x7f00000051c0)=""/82, 0x52}, {&(0x7f0000005240)=""/210, 0xd2}], 0x4, &(0x7f0000005380)=""/58, 0x3a}, 0x80000001}], 0xa, 0x2000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'nlmon0\x00', 0x8000}) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:08 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x0) 15:34:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="89fd6fca6dd988208f", 0x9, 0x10000}, {&(0x7f0000000180)="2a377115f80a24d04a5d62b07f857c13d88c17bef60a334282220aa982f667ca09ac8933deae4fbd732ad13f20f82e1b8a14e5186e7fabbcad560e909bcbed9ea483e8e943eff706ae0f59be63853d67215b8de2599b239b183b9fbd0e20448389b4e7d0a0cf170740813a116d676c3a1deab504", 0x74, 0x8}, {&(0x7f0000000200)="7fa49b23fca3b1a075311d4055ab056e06ecd77f417eb1353db03e8c999ab05c4c94f4e39ce71bf8cdad074aa6e5bf85aec4c2bc0525076cd70cd77eb5df706fa58e2065a029616a7b435fd516b1c1d2c542932597f380fa8e035f8e76cb721d77e852946eb660690f44e9d140ba823e619c541726c1254f0b5644bd", 0x7c, 0x3}], 0x400, &(0x7f0000000300)='wlan1\x95cpuset\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) write$apparmor_current(r1, &(0x7f0000000480)=@hat={'changehat ', 0x4, 0x5e, ['net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02', 'wlan1\x95cpuset\x00']}, 0x16a) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 15:34:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b14f91cd808e6b006969ef69dc00d98a20d0d0c44139fd5bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc48192558dc3c366450f186746d1d97c7c730f5726400f0d18c4ee6d5fe2b671b6714600000a8ab1b182010804f4f30fbd110f000000") fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, <r1=>0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000280)=<r3=>0x0, &(0x7f00000002c0), &(0x7f0000000300)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r4, 0xc0404309, &(0x7f0000000380)=0x7fffffff) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xe) setresuid(r1, r2, r3) 15:34:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={<r2=>0x0, 0x5}, &(0x7f0000000240)=0x8) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000001c0)={<r3=>0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0xac, 0x0, &(0x7f0000000380)=[@release={0x40046306, 0x2}, @reply_sg={0x40486312, {{0x1, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x18, 0x28, &(0x7f0000000280)=[@flat={0x73682a85, 0xb, r3, 0x4}], &(0x7f00000002c0)=[0x48, 0x30, 0x0, 0x30, 0x78]}, 0x401}}, @acquire={0x40046305, 0x2}, @enter_looper, @reply_sg={0x40486312, {{0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x40, &(0x7f0000000300)=[@fd={0x66642a85, 0x0, r1, 0x0, 0x3}], &(0x7f0000000340)=[0x58, 0x78, 0x18, 0x28, 0x20, 0x38, 0x78, 0x78]}, 0xc39}}], 0xd3, 0x0, &(0x7f0000000440)="a8e91d28ecb66b5dcb2150a6c3e80adee11a70d5fe409aac65c9ec494caca6ac2c1c13a37991aef91e0c6171dd3287f31f01fb055e5120563c631b5dda02e43ce541550e0f72a316c633deda519b077daaa7505bc5f0279ef4a3c7d0bccbfa72c7d50cf0cea5282302e430282de5913b5cb90464d4b9fc16a54588cbeda7c1c4d55fd199bba4800ffe591d39c4f91a146e2f05de5edc30e6b460dbe5c69f62f0f4b4fff0d9c1a9e48fa7e00b4899fdf3c9ab1a1c145cc896c6033e2702ffd5a2cacf89b557058ed90435f6882e9b7f52e49516"}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r2, 0x4, 0x3f9, 0x3}, 0x10) syz_execute_func(&(0x7f00000006c0)="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") 15:34:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x7fd) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x2, 0x400) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) r1 = dup2(r0, r0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) write$sndseq(r1, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0xfffffffffffffffe, @tick=0x3ff, {0x0, 0xfffffffffffffffd}, {0x0, 0x3}, @quote}], 0x30) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) 15:34:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x87, @remote, 0x4e21, 0x0, 'wrr\x00', 0x0, 0x8000, 0x76}, {@local, 0x4e20, 0x2003, 0x51, 0x7d59}}, 0x44) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'bridge0\x00', <r2=>0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000580)={r2, 0x1, 0x6, @random="c44384084429"}, 0x10) 15:34:08 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x8, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xa302d2) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x40, 0x1000000000003) write$P9_RLOCK(r0, 0x0, 0xffffffffffffffe7) 15:34:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x280102, 0x0) write$selinux_access(r1, &(0x7f0000000040)={'system_u:object_r:devicekit_power_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xfffffffffffffffa}, 0x50) 15:34:09 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, <r2=>0x0}) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)={[{@xino_auto='xino=auto'}, {@metacopy_off='metacopy=off'}, {@xino_auto='xino=auto'}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/thread-self/attr/current\x00'}}, {@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x32, 0x34, 0x37, 0x65, 0x32, 0x31, 0x36], 0x2d, [0x65, 0x39, 0x7f, 0x61], 0x2d, [0x77, 0x33, 0x73, 0x63], 0x2d, [0x61, 0x67, 0x76], 0x2d, [0x65, 0x7f, 0x77, 0x65, 0x62, 0x38, 0x7f, 0x62]}}}, {@obj_type={'obj_type', 0x3d, '#wlan1{:proc'}}, {@subj_user={'subj_user'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@hash='hash'}, {@dont_hash='dont_hash'}]}) r3 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r4 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x3f, @loopback, 0x3ff}], 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r7 = dup2(r0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r7, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:09 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xff, 0x4000) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x10010, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000080)={'raw\x00', 0x4d, "a54049ab6c55f654cf3760b007397c701ccbcd055550f823905de9134d50c6a93c6ecbac93be6608b943b06ef073b700cd7cd82e96ffeca942b3c7e2551be31dd84029cc411a729c9fcdc6b84d"}, &(0x7f0000000100)=0x71) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 726.150136] net_ratelimit: 20 callbacks suppressed [ 726.150142] protocol 88fb is buggy, dev hsr_slave_0 [ 726.160359] protocol 88fb is buggy, dev hsr_slave_1 15:34:09 executing program 2: r0 = socket$inet(0x2, 0x40000000003, 0x800000800000001) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000240)=0xc) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xffffffff00000000, 0x4001) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={<r2=>0x0, 0x4, 0x10, 0xffffffffb81a3b72, 0x8}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0xd9, "77fd4026bb77161ab60cec2c49a8ac4f43676ce9a8f674ff648d99007867a423a1f26a1f17c762f18759376ddc290e6fe812f0d200692e68c921561a33983224119e5f6fe82397573b1ca2580143f47ecebd3d78ac4980c65048c563488ebe499a41e835711182a3852bd0b3773db0b2f7ae7a92dbd36e87de8f3fdef617fe90ce5c11fc42397d8e01709a52a3201c17cfbebad8f387c22a38e2681a83b3a34da1696ce7bf7559cfe2f70650b03dd5ed28cbdb5c2a110c91bbba5904019fbeb435cda05f05c5e10ff166d0f73c8ab7a58666c1f909f5d98c07"}, &(0x7f0000000180)=0xe1) 15:34:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={<r2=>0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/cgroup\x00') open_by_handle_at(r0, &(0x7f0000000000)={0x4a, 0x7, "44ec10ce4737f2bd31fec53647a1023cfa52a3792e0ad03fc160441bf861c7f26684ad44e4657da6b5f0011b46a1cb146468d2bc813dbbb71b19cda063b5781e2a85"}, 0x10000) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="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") [ 726.451529] IPVS: set_ctl: invalid protocol: 135 172.20.20.187:20001 15:34:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001, &(0x7f0000000200)="5d27c9bcc95e05da3806b2f9a55cc47525a8dd2c8fef43a060415b66181f7b3d1a1f33f9cc5e8e46fcebeb5c2f077d780c875cee144b967c8c315e08867f651281cc326b1d55ab4f5d8e1156d74569a8ada7296f6bd465c39c38d518f73b3c07a2bd168f920c894da41a062f2e030faa10d2ccf7b711caf99283ff6c819618e5d402155c0e09cf102b106e328de35c9ff031e346aa4ca693d8bead239da24b1f6f4f7fcd5c93a89ebacc6ca7de1105e76dfd9470de868137db0b2af54ff0ca2334c59c109df00b0cc6c7a4a7117da2163a6519676f8c9ee35fd350bd14134b32d9549cf7cc4f904a317f3ea69093c0660188b267d27b90471588b71ed5b50f0cd5b8ecb96db04bdbc8fed4164bde8e61cd04") r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'nr0\x00', {0x2, 0x4e23, @broadcast}}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000380)=0x2) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000002100200225bd7000ffdbdf250600140429000000080000000b00000008000100e0000002080004005500000008000200e0000002080015000200000008000b00050000000800010000000d79"], 0x50}, 0x1, 0x0, 0x0, 0x8044}, 0x1) [ 726.630136] protocol 88fb is buggy, dev hsr_slave_0 [ 726.635271] protocol 88fb is buggy, dev hsr_slave_1 15:34:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000600)="0113000007000000efc070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = memfd_create(&(0x7f0000000640)='hash\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f00000003c0)=""/178) unshare(0x8000400) r5 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f6, 0xfffffffffffffffd, 0x0) r6 = gettid() kcmp(r6, r6, 0x0, r2, r5) mq_notify(r1, &(0x7f0000000480)={0x0, 0x2000000003, 0x0, @tid=r6}) write$P9_RREAD(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="3e000000750200ff07000053573292023783546d8eb62c77bba27f3c730e236e81e9ac7072ca373868c168863ddfc38c798d411d46038190895a8d9f805a76c7af1f35f55b80601f40cdb1e2"], 0x35) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80802, 0x0) write$P9_RATTACH(r7, &(0x7f0000000200)={0x14, 0x69, 0x1, {0x6, 0x4, 0x2}}, 0x14) ioctl$TIOCSPGRP(r7, 0x5410, &(0x7f0000000100)=r6) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r7, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="ffff00000000000000cdaaaafda6000000000000000000d0e24264e55d38d4909776b316c479"], 0x1}, 0x1, 0x0, 0x0, 0x4801}, 0x10) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) clone(0x8000002102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000580)) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 726.870246] protocol 88fb is buggy, dev hsr_slave_0 [ 726.875557] protocol 88fb is buggy, dev hsr_slave_1 15:34:09 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x81, 0x840) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)=0x1) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x4000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000000c0)={0x55, 0x0, [], {0x0, @bt={0x81, 0x5, 0x1, 0x0, 0x0, 0x8, 0x13e, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x1, 0x8, 0x4}}}) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x200000) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:09 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x82) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 727.110187] protocol 88fb is buggy, dev hsr_slave_0 [ 727.115321] protocol 88fb is buggy, dev hsr_slave_1 [ 727.122543] kauditd_printk_skb: 225 callbacks suppressed [ 727.122551] audit: type=1400 audit(1556724850.047:14026): avc: denied { map } for pid=21349 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:10 executing program 3: syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x640001) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000700)="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") [ 727.259899] audit: type=1400 audit(1556724850.087:14027): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.284601] protocol 88fb is buggy, dev hsr_slave_0 [ 727.284659] protocol 88fb is buggy, dev hsr_slave_1 [ 727.504085] audit: type=1400 audit(1556724850.087:14028): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:10 executing program 2: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = syz_open_dev$audion(0x0, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={<r2=>0x0, 0xb69}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x6}, &(0x7f0000000100)=0x8) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 15:34:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000280)=@full={0xb, @remote, @remote, 0x0, [@null, @rose, @netrom, @rose, @rose, @netrom]}, &(0x7f00000002c0)=0x40, 0x80000) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f0000000540)=""/187, 0xbb}, {&(0x7f0000000600)=""/128, 0x80}], 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000001c0)={@ethernet={0x6, @dev={[], 0x19}}, {&(0x7f0000000080)=""/249, 0xf9}, &(0x7f0000000180), 0x1}, 0xa0) [ 727.668145] audit: type=1400 audit(1556724850.147:14029): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 727.848223] audit: type=1400 audit(1556724850.147:14030): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:10 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) r2 = accept$inet6(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000100)={<r3=>0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0xfffffffffffffffb, 0x0, 0x2, 0x0, 0xf5, 0x73, 0x7fff, 0x7f, r3}, &(0x7f00000001c0)=0x20) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0xfffffffffffffffe) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000480)={r3, @in={{0x2, 0x4e21, @multicast2}}, 0x9124, 0x8}, 0x90) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000280)={<r7=>0x0, 0x80000, r5}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000002c0)={r7, 0x80000, r5}) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r6, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r8 = dup2(r6, r6) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0) sendto$inet(r6, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 727.882860] audit: type=1400 audit(1556724850.177:14031): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.034838] audit: type=1400 audit(1556724850.177:14032): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfffffffffffffdca) read$alg(r1, &(0x7f00000000c0)=""/214, 0xd6) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000023c0)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 15:34:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='net/arp\x00'}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f0000002380)={0x0, <r1=>0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/arp\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) preadv(r2, &(0x7f00000023c0)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000002440)=""/12, 0xc}, {&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000001200)=""/204, 0xcc}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f0000002300)=""/5, 0x5}], 0x7, 0x4e) 15:34:11 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0xd5) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = dup2(r0, r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xcd, 0x400000) r3 = dup2(r0, r1) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000000)={{0x8, 0x2, 0x6, 0x7, 0x101, 0x8001}, 0xfffffffffffffff7}) sendto$inet6(r3, 0x0, 0xffffff4a, 0x0, 0x0, 0x0) [ 728.201483] audit: type=1400 audit(1556724850.277:14033): avc: denied { map } for pid=21356 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000140)={0x7, 0x13, 0x2, 0x2, 0x3, 0x3, 0x3ff, 0x9db, <r1=>0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x1000000000000}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={<r3=>0x0}, &(0x7f00000000c0)=0xc) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r4, &(0x7f00000017c0), 0x20, 0x701) 15:34:11 executing program 3: times(&(0x7f0000000200)) r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x1fc, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f00000001c0)=0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 728.394101] audit: type=1400 audit(1556724850.277:14034): avc: denied { map } for pid=21356 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 728.569323] audit: type=1400 audit(1556724850.307:14035): avc: denied { map } for pid=21356 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") nanosleep(&(0x7f0000000080), &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:11 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) r1 = eventfd2(0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x7f) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)=r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f00000000c0)=""/10, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x3, 0x1, 0x0, &(0x7f0000000140)=""/118, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0x1) 15:34:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000000)=""/109, &(0x7f00000000c0)=0x6d) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.impure\x00', &(0x7f0000000300)='syz1\x00', 0x5, 0x1) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "fe"}, 0x119) 15:34:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x80800, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=<r2=>0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/udp\x00') ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl(r1, 0x8001, &(0x7f0000000100)="8aa3df4e00caba47773ca919a6d2a73994110f52cd4e7603067c9d3788331fe1649f34a37d80c9feafbad01907d4a8b9e2b7739efc211df818b69a554a23b4abb7d709ab7e2a89bcfca91eec3b77d0f0ebafa73cc49406f198a7868c3a21c42366f323dd759c4c75361620454bcb7b7a08e9582e44bc6849297c60bb54021bb780d36e994a4222a8d337133d24152406e9b7550e73844e056ec147748a2975694b9fc2fa82c2897b0fe6171b4141262e6187c1836b229e923bb1c42a4f29d966e36f89577baa57b94148f9945b731852b975364b203ef47202161c7f4d46647ee691babffedf8de505") ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) 15:34:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f00000000c0)=@vsock={0x28, 0x0, 0xffffffff, @reserved}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000140)="6c76dc9c86131ac2dc7fcd5e7858676863e07ce59cf95c5eac202c0167c0fb92c4484046904e50c2c34dab4cb0eae507abfc318dc38520f14f2d1c445322c5a484b3ef801fe4db6a250a20b85d73e6f82ef56980e5230c1a0e67a748", 0x5c}, {&(0x7f00000001c0)="b05999f3aae9d30495cce677bf904fce87b4f180cc48b3482043e769c84af71f1c62b9b25ae1af3b7d7bb0586fba55c542990e7980c25647fa0a16e2d89cfc16ad620417", 0x44}, {&(0x7f0000000240)="ea13130c5f9538b4eb69754c9038e887c35cf5ffdbab0d1ed8572e8c4c16e2226e5043f91afb7a1567ceac04b31ea611178a8c4daa45b93405dedd5ce54957310c32b7699d92e94a0a1ad10ce75a7520176bced91a0f898bca41b8e8d56b51119c73594fe2b07cecd62bfdd5e2c35bfc6de9a4d4851d0eb62e54912fbbd910ae06ee1a677a3002067eb0c892e9a04b562f60b42a1d", 0x95}, {&(0x7f0000000300)="a28a8d11be2a97b85fadf95c1b8f1f62f1e91f98ae01e1b4cffb0fba5876db6764d923890d7026d44b7331c753068d40e22180a4644b073d109c57", 0x3b}, {&(0x7f0000000340)="057bd179b235d27b60ac83d7c0d50b8a46852aa419b1b41a7768b2823c6e3b5e1c1fe0c03063f9819c7940acdc6da6c802e6f9375ee012eaa4b4f118652433723fe6f1dfa91bd9cd6aef139eda91002b1eda3e299ca0c605dc6139910fb13a081c980d83dc0caf4203b094d434f80c7d4df7aef805a6051105027bf63c326eb94b2eaeb84c9a0d4a8579daf9a421e4f6f362ec9a50561ead59db034dc8f281685901fe99f5e60be35941038fc336167c72399cddbf48aa1a77bb87e04ccd5aae3d8c092e8626c5d03a282298df71108851b224cca5206f4704e0d9cc278f5554c3fdbe5e5f", 0xe5}, {&(0x7f0000000440)="15fb77ac7bdc18d0cf43d0c7b9a06fa9698233f7935dc8bac688d3a769c1ebf59a5800d3e902b5cad0ea827d75e4c39500809ed3", 0x34}], 0x6, &(0x7f0000000500)=[{0x68, 0x112, 0x1000, "d2d78d5d2699d103170eb599e4dfa4a9944e1484b5f788479652d1528bfcbea94abdfedde4c4c20e6da5d029e82280b210578544594a233ef7a1e34efaa8b518dfb4416721f45de1daa691558c72994bab9feb"}, {0x30, 0x0, 0x7, "42afa6f0158e029cc7a76d37982405dcd3f6d248d6cff87fcdf215cb"}, {0x58, 0x109, 0x1f, "e3eefb7ec1cfab9ea805b1f471cb90dc6e7bd0b178187a39a592014c83ee3e4aea5f43f948a7db3b6e803af05194f071fa809a141bf4ddb57b8bc059a153331b0940d1419a28"}, {0x30, 0x110, 0x5, "8001f92787fe9861f6757a80576f704d5e0d8ecac045399c3a536136"}, {0x18, 0x0, 0x2, "72750f8e330f"}, {0x50, 0x113, 0x9, "c19ff54847060a1388ce4ee192e5d3020135dc3b98c2090ab3f01cc516678a42386a6916f7359d9239ce46a12618c3ea40938720dba3a448cf04"}, {0xf8, 0x6, 0x7, "115397697211679a1b227dc53e143da20a0a8bd729ebd9f8880d91dfd38e729a03f10f07e76497087bb3360f068d5f16413fdfaa3ee5e5e7b061f9abeccd53f555bbeda2496109583af981eb0b948b44acb74eea096289460088e9ecc9c75f701d203fb69804c7792a70b9a3ab71a701f47549b906b4ca4b381256f074fc01b64434d329e49b5dee1c259c7299d33f341ea33e2519d13512a953967d6c6123dc58aaa18ff13bde50bc1ab9bbcb57ca74bfc2ff239b5f6e6398260e90f6ef2a3f1a2ffd7b143b272c55278475303880fd55447c3b1f0eff7bcabdabb6a346d1fc95dc07"}], 0x280}, 0x8080) 15:34:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x0, 0x700) 15:34:12 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) getsockname$netrom(r4, &(0x7f00000000c0)={{0x3, @null}, [@rose, @null, @bcast, @default, @remote, @null, @netrom, @rose]}, &(0x7f0000000040)=0x48) 15:34:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x125}}], 0xfd, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x0, 0x0) [ 729.614023] hid-generic 0000:0000:0000.0001: item fetching failed at offset -1460450047 [ 729.690468] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 729.776144] hid-generic 0000:0000:0000.0002: item fetching failed at offset -1950046143 [ 729.819788] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 15:34:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, 0x40, &(0x7f0000ffc000/0x4000)=nil, 0x1f}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:34:12 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x5, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0, 0x80}, {r0, 0x200}], 0x2, 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10800, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000000c0)={{0x80000000, 0x5}, 'port1\x00', 0x20, 0x10, 0x4, 0x3, 0xce, 0x0, 0x3ff, 0x0, 0x2, 0xd5e6}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3e, 0x0) 15:34:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=@nullb='[0::]:4547:\x00', &(0x7f0000000100)='./file0/file1\x00', &(0x7f00000000c0)='ceph\x00', 0x1, 0x0) 15:34:13 executing program 4: r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000180)="0adc1f121c1f3f31a3d070") r2 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x401, 0x400802) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000300)={0x3, 0x0, @ioapic={0x4005, 0x9, 0xfffffffffffff61c, 0x2, 0x0, [{0x5, 0x12, 0x401, [], 0xfff}, {0x2, 0x890b, 0x4c1f, [], 0x8}, {0x100000001, 0x2, 0xfff, [], 0xfffffffffffffbff}, {0x8, 0x1, 0xea}, {0x0, 0x36c, 0x3, [], 0x4}, {0x80f, 0x1, 0x5, [], 0x5}, {0x1ff, 0x7, 0x844c}, {0x5, 0x9, 0x400, [], 0x7}, {0x6bf9, 0x9b4, 0x8, [], 0x49fd}, {0x1f, 0xb7, 0xfffffffffffffc01, [], 0x5}, {0x8, 0x9, 0x5, [], 0x8}, {0x2, 0xa3c, 0x1ff, [], 0xfffffffffffffff7}, {0xffffffff, 0x200, 0x2, [], 0x100000000}, {0x8, 0xffffffff, 0x89a, [], 0x3}, {0x7, 0x1, 0x9, [], 0x7fffffff}, {0x400, 0x0, 0x18, [], 0x88c}, {0x0, 0x7ff, 0x1, [], 0x7f}, {0x100000001, 0x0, 0x176fc8e0, [], 0x200}, {0x800, 0x40, 0x81, [], 0x1}, {0x7fff, 0x7, 0x8, [], 0x8eb5}, {0xfc47, 0xffffffffffff54ad, 0x40, [], 0x6}, {0x0, 0x7, 0x5cb, [], 0x1}, {0x80, 0xfffffffffffff001, 0x7ff, [], 0xea3}, {0x5, 0x8, 0x4}]}}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x7, 0x0, &(0x7f0000000080)=0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={<r4=>0xffffffffffffffff}, 0x13f, 0x3}}, 0x238) r5 = open(&(0x7f00000016c0)='./file0\x00', 0xe083, 0xc2) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000001700)={0x1, 0x5, 0x6, 0xabf, 0xff}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0x1b}}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) r6 = syz_genetlink_get_family_id$team(&(0x7f0000001780)='team\x00') accept$packet(r3, &(0x7f00000017c0)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001800)=0x14) accept4(r2, &(0x7f0000001840)=@ll={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000018c0)=0x80, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000019c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000001ac0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000001cc0)=0xe8) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001d00)={<r11=>0x0}, &(0x7f0000001d40)=0xc) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000001e40)={@rand_addr, <r12=>0x0}, &(0x7f0000001e80)=0x14) getpeername$packet(r1, &(0x7f0000001ec0)={0x11, 0x0, <r13=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000002080)={@multicast2, @empty, <r15=>0x0}, &(0x7f00000020c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002100)={'nr0\x00', <r16=>0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002140)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r17=>0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000002240)=0xe8) getpeername$packet(r0, &(0x7f0000002280)={0x11, 0x0, <r18=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002300)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000002400)=0xe8) getsockname$packet(r3, &(0x7f0000002440)={0x11, 0x0, <r20=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000024c0)={'team0\x00', <r21=>0x0}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000002780)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r22=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000002880)=0xe8) getsockname$packet(r2, &(0x7f00000028c0)={0x11, 0x0, <r23=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002900)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000002940)={'team0\x00', <r24=>0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002980)={'irlan0\x00', <r25=>0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000029c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r26=>0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002ac0)=0xe8) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000002b40)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002b00)={&(0x7f0000003180)={0x744, r6, 0xa00, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x1f4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x51}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x87f}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x170, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x8, 0x400, 0x0, 0xfffffffffffffffa}, {0x4, 0xfffffffffffffffb, 0xff, 0x1}, {0x82, 0x5, 0xfffffffffffffffe}, {0x81, 0x5, 0x800, 0x1e80}, {0x1, 0x8, 0x5, 0x2}, {0x1, 0x7, 0x6, 0x3}, {0x10000, 0x9ccc, 0x1380, 0xffff}, {0x4, 0x5, 0x59e01cfc, 0x1}, {0x3f, 0x9, 0x2b93, 0x1ff}, {0x7, 0x7f, 0x7fff, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}, {{0x8, 0x1, r16}, {0x12c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x280, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6f9c, 0x9, 0xa459, 0x574c}, {0x5, 0xa8, 0x1, 0x9}, {0x80000001, 0xea, 0x3, 0xfffffffffffeffff}, {0x101, 0x8, 0xfff, 0x4}, {0xf2, 0x200, 0xf66, 0x1}, {0x8280, 0x3, 0x9, 0x4}, {0x4, 0x9}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7d81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x70d}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}]}}]}, 0x744}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) preadv(r3, &(0x7f0000001680)=[{&(0x7f0000000400)=""/248, 0xf8}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/80, 0x50}, {&(0x7f0000001580)=""/252, 0xfc}], 0x4, 0x700) 15:34:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x7}], 0x340, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:13 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000280)=0xc) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) socket$inet(0x2, 0x80004, 0x1ff) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:13 executing program 2: socket$kcm(0x2, 0x400, 0x73) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f00000000c0)={0x1, 0xffffffff, 0x0, 0x8000}) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0xffffffffffffffbe) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) r3 = accept$alg(r2, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0x5, 0x3, 0x4, 0x2}) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 15:34:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x9}], 0x1, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80202, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x10d, 0x6, 0xffff, "3cc5219953f6892db747f182fd63cfb5", "6f4bdb6bccea5f4482c6a1b905b4023d811eceb60c438744b655639990edf64db951da6741990464d409a8d43653935cba9aba1dae060362b7ac3c969cb7011dd86c1bfa7b6adccf66680b591d03621e9f88dba737e2249b5582ba434d1b3144fc3a301b00989249929b561a7849cefcee142fc6838738f5ef427a98a3a142ae73e7f16337e1d871630ec99255bdedab6cd848fc23367f7c6af2b60b22bccc32c66eaa07a4f2c7883ac8672165fbdfa1f5f73802fb5acfe8e82c32bb04fa10a0a1d1975685e5f656542cdc334ef104784f1ff429d39d8cb3a5adc9f2443fbf9f86264fd96fcdc484307c01895517799adfa9afe0a8801d83"}, 0x10d, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:13 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000150000,user_id=', @ANYRESDEC=r1, @ANYBLOB="35100000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,allow_other,default_permissions,\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000040000000000000000000000000000000000000000000000000000000000ed0000000000"], 0x28) 15:34:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x10001, 0x40) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x8}, &(0x7f00000005c0)=0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000300)={'y\x00', {0x2, 0x4e21, @loopback}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000600)={0x0, 0x1000, "2628eda67c3441ddee1800a144a5ee27decc92e403a181fa36f2e4b301800ad6874f55f4e7b3a92bf2e43cf36f10e17fcf46436eccc5211382975961d0332865439d7240e984816b5ed7d697b9145a1ea9052d3695c920bdccd1ea85befbd280f0c445c15ee94fbcd8ab7a9d1434893384f9dc6af264055d81028121c01141bf5882d568f67b9e0c4230505e79997e3a7e1994c402a321bce959d51f3d12aeb313c4028370beed618e999d2e1f0a8a8c0cd571e214a60baed2472eaed034b0baa69d8029733edbe049fd213a5da9a369a2172f6810c9c438bf229cfbef158326f7c426d6e0f70fe0524764f4de1ee811a11e338a03f2e3a1b234b37dd82ff495332967ea21bd54a402327de502752df4739edf9bef24169677ca8dddb5c62946fe613f1ac3f192bb0a2b8de1e27b9353062a972df4ac692900df34066cbbc45cb60b04ca08ad9abbc0a5a43a3a653deef91c798e425b4cf2e46aac66ce6058c10001dfa4257f3fbfff18ade30a5d236cd6161692e8576d88fd791e39c4816863f36743106debea909c4e8ca53a4992a6bfbde6c1147257631159bd87f773d0d1d613c98088c0033cfaa2578f3f5029c89d8e1584f52a629fe4a568fdc8878c1f2e51d922d81ea705568c1fe7a22c84946b4a16c0144a5d8980d98c48d4cdfdf1623e13cae35adad6e77a866fef85658b41aa4b973d9d862a8a5632fbdafc138e77052f3a21342e4264b7bcc78e0b13f6c309dc5e9b5ba1c717b9578230ca10192bfedd991b27d2a5622bce1aed1fde02df99bcba9d34291499443434a0c71c7634efe462e50718381da1ace2eadbf33f47010d0d9081e5d2f17363acc53e346316e6c3f5c283393b0ae40cf00cbd87378d93e6e245a77a76b1e4ccae641534aabb2c0bfd459283606d396c8d49a60138a937d510d58ffe6c27f6b05dd863afd64332fdcf4596ddb63be8f1769b52917ad704495f4aa87dcf0ee528168b11d1198de350746d44e73b4b5f427d3252bb11180abccb86dd7b2907d7aee0f8e4ecdc1640b30c3bb3569fb9d13805e152087c0bf602166d0516c330bd9ac4829e387850442dbb562afe14c32884520665882064e9e843e12ce2018992668cfc3ec5ba944433509c763cebc439f3b42cd433b3305a67ee62e06092c7fe27bd307046d6c6066f9db1ac157b5cfe38125289d8bd95677ae855c9a8cb6cd11e8511de712768aeeb2fcbe526e7056e596621f333a701f582b21ad919b00598c2c2b735048699ccada9d4d86284a13fc6ae29f7693bd5535900a9afbb833fa240d9490d03b743ad01debd6f4abf11cb30eac31651a8f2bdc0402b9288c121e74ec0d7f414927cb7a86fde89677de7bcc83274ae7ea730a47539cbdbcde4b4699807ff9bb5af785c1a2ab7716d1877947ce92a8a8aac99fd02c77e931668f977583079b124df8fd5778bd670421166884dd914ac67d50765c822e6b8cae2b92c254dda9284b6723e0bc0628831388da97909b980d33004aa04479af9ffbdc45182c7822ac695f144254a493cb7470c4d6e174395fc8780129dac3a37d7a0d28ff9130e661750c3c4a29b1c840b0d832899ac9025d53530450c868b6cac3ea15cf18930320d5ea6df8f9ddaed7f7cdcd3b3afe19538e31f56864adefdecfcc8d5746675466d9e2bbab63f07c2e7d925ec842bb53c4d4ab851bb9260a2423c337577f529f779688fb6b383c364cd93a62dd85a7d5e2ca125629aee1758001962b36a2d48a8593ad33ba2bacb4e3c3b1e21f6e2ae00d35fe64e6cefb9b6dd940e27f2554cd961cede97cd475e5c495150ebeef4820b2bfbe3d934c133544050f68e9ed8ebe5c6f4b857d93667cdf31542fcaa589f96a39dc02e0a929ddeb239103c8a72eda55dea71b8b63ffaf199b98efc57631a8ba6d18cf45a92506000e705a612f0b67b0e4ccbadcef4d7394b9bc856e1ff7997877c39ab0783c7ff8595a0eab595eb55df69796395a9fcc757717894111e5d63e53eb90dcdf17d3a7f467a0491e320276bfee98ff338f7f37948fa01e8c7ef4e030205a5a20b08b08e54ab437195092664b5f8a4808678868a47aa8ddb98e95c9f7b5e1169ce5ddd15d22b68ef909081e5c56ed30c6ec779dca15928629425b1e42e8d2d3b4c6986d27cdd5ffa3ff0b1b8170de82d2a5e0476ee603e12b56b9e82538b9fd8f8d9e71d6a399fabc5e9969da8b38c49124b9bd2280cbfc11286698df6982d90a51235b2a87eda04a9f355451cf9db59c1030bf72acd8d25b4fd7751f7e7738035d2115a9331e62cd0153e6a36a6047f31039271666f5280269c1d5115b294cfb4aca11b05c7eea4bc92fd4ef9ba456b6a0cf837133e1af36e16bf86e4137dab30a3fc841cc3fa5c944823f9d782de58172e34828b94e91bd4791dafeb11873c2e6fce934bd8f415f72d079ec7c7a840be8f14be117d44f001bbdf5c95fa052b0cf325c52ca49c160ccaf6bb465bedaf43bbdc59f2a6de18d126c865041bf41dea6bb376a576ce8ed8da924f0fe8436c430e5160f768618aaf7c3dfb7168c87b8ecca140a964d7343cade507110a3f229b5ca77ac49812fa29241538c30a4d7a606a4cb534db77ec09bbe0a360323be85bf34e70d0c975bcb2aac6b52c6b66ca1277e1a00552c0e2728e5e45308fb5bbde911c63ab7e1fdbafdb413a4e0fdac6b38643e367f50e2b6b0c62120a6d8ccb3782a0b75e0272464352369b0f27c4d80949be32484fc98ce11473a9f89ccabda6213db513181a5e761feff586cbdd71a8772f1c8732a6d9d24f88697b99df7b1467bb6a5ca2b9f38e8fb583d872cf2b07be15a95efc32d9dc569b48d6f98faf28d44b963dc1b5ba7470b035755329df2d7e3a23d4f637c239f892c74f940f2d15dee4fc70a75f957e26de9555b58b4f75f49da50b3ad9f794d6e1f2f415e94ff31457e9ea363f701d984d616523740d7f79727aa62d88a28aab09dba69616bb41da47ed0f5c3e0c11bb9f0e318e6e8752e2c5ca4d2fc3b5ad6363ddc21499902916eed0004464764e1010b2d1cf67ad95c5af869c4a2ae5c44679e9edda59ed124f586cf026b620b1d59959ab37fe31dd6c35483638061b3999985395ea8186dc1540e800d5757d8a58656b916b1cff8fb77cd0e6f945eb73b58a259c8a4b0e753be8968bdab2cd76efa19e1c0f689428b583c1314a4676868cddae3e1dde393700f528e879f0a1ef9bdd7f5c53a4bf5224586759381d4903986987b753ac400d6200c6b7bd120c3b56a87dd8d6d13d9de4712fd465bc57c386c4a55cfef54ade89b2af22502bdbb2733377ecfa40f64318da838d874d4b3a145493bd52d3b7c85bd36420844659c952100ef79bb40127f550ed64ddeb16e6a40baff774fab196a343bc33afba7332ea5ed4468b8f275dcb579734d778a024341722bd10f1030a3c40741faf44530ada7e3cf43b55b9585e048c476812c0dc9279fa8be62059252cdd0511abf5b8c6ff4ec4befcb593febdb5453ac0b8e70ce99e95fb4627fb90ab1a274f06d5f5c6b4f0d8357751ff94b91e508b99051edad902ab0ba9daa017c86ce1c4a39089c8bc28ecd603f6e882f5333e78b106d1b56345d51c26104be190d96b8074969469f28ef05395c555b73c7e88f95e97e45cc4c02317b751e5a5594eced28e584be6780a9d182b29fd08f43311ab552907314dbc09707ca968ca8eaf17454342c2bbeb4ac9e7e6310036037ea75a58477f525b195fa306c8c9df0bf2c194c3726a3dc53a616482c370a633484ff70ca64e4a14dc53ea30da833cb5b442ce7447963971967c45311d717c7cb6e6a1a752cffe14b525d30af697939f4b14e98674247c7ca0aa88fa6d723ceaf72a35d561a21b2add11d9578cdeaaec8eb5899f3607f71d9b706462f3bcc14032b7717aeb993b409eddb28e64634eed250f7642bab7f37333ade309dab80d4c11a21acabfc923610fbdd75789d2fdc2de3314ed2f902a1bcfd6413926a0025d61c065c65f094af4182a7a9fa43a90a0d20a63ac2c0ed4fd62dc32804c799a281b80181805dfd8c32648bbf76561fefe1c1b8a9bf719a20fcd185d153bfc8d23f6084f628d455b2572021d94273f6337ca36656d6482d5fad9f236744466ae513bc726511a36f0026b975f5acca2fa59e26b9f22e758c27d8bc94d2b261d9b163942c91cc082ab8e0553cf18e8e6cc4fe0d66be8011b220f22acc0870b1d8de48caff1d49c5bc9882b981f83ab031580a72adaef49948d7aff249c687fe9a90284c28d02405a3c0f3f58805666fef802b45267b6cef673ba7d92180748bcc153796d77890397496d6ebf930363ffe4ea51224e0f8386c97225ceb98ceb8790b20819f3ccd43b79c8b1ca1c6835b64c1d84b0c63abb26be3acc4ea1cc9e38f4aff05ea468ca06e8d6a86e850d2063420709df24a8a2ce9b00b0fd4cb1dfe857313c95cc906dac7de7e4e93f6d601d8c678e777de6f7f738e915c597e3e9df7ce1c0c495fc52c047961df0aa8859e9bffd1f0d567f9c01aefb9f83c38958d5972d6a8ec1c92a19a67e87fb45f794f0ac4b2e7e850bdf7c6df557ed3901191fea4bf73b2fb36753763c6fc6b38951eb297fa62173643fd92003e9901be3f452375ecf9f36803e93a86aceea5476ecbb9f5d445237d49879ccd28c85899ec7e37bafe956f9b986cd0a29e0509d0f9edc5c0d6763f3ebae7f13ea17f6b90075a0eadb1587f8b0b29fb0a783fe26466a96731e6892b829d4cb581539162d1025f6f77ed5f62bb2d4f7675c177fdc062fed2519bf67a05f1fbe7a1b838b7860c52db053aa23aae472c52fabbe8754d583dcab35645082fb2197c84cbe2523650e637aed27f43eddef41eb501390653b1e7a7f4fec2370c10b26bea9735070f602f411da7d37255b5e74c5d5445a7a28ea56d3b449f52ab8e2cc287397e41181f42113a3547ee112513aa1e0f7748161417c56b5825ca893363d4e4f2ea63af8ef003c6547cc728e9a2fdb8b9a49ebe886eeab19ca6ec11ed9001133331c157b9488d1d89f0d6ff7574407d2265b9e728594325c86543efbd4a8dc2dd6a1d8a82d2bc1e8bd59378f4677083f82377a65048b209205ef7641444019b0cb1f67a5301498f7e1f594f88410db986dba6c930f1df8abd03cadf9a948b1e4ef308725c3f1409f8636f0a4f6692be8da178fdb60aa170276f9332d6a3b3754797813405c148fb34e581d57379a5f7917db8e581c5a81ff9eee2ff903ae7bb79fb55c0374122a70ad908b3ac8f3fd6717f95d905a44fc1bb9a1e0c72afa7575d2900b5a1141881049158597655fb40d5dd751729e8089a21bd164d9098923b7a68e586b40bd5e16791759fa547dd36b3fd92e94e2affd5b739e4c0f8f492b7a0f5ed243bd1d1b16a88b37eb387f7f982f7913aa6b41d3005625194e73c5395fc05f5db79170e02a97b507a64e4ae44cf38a2a299457ab670a30be7669677af2d09d1a6eb73be9f0313c70b5d4ecaae89a20965360cf72dc4a18ca2d7250e3671df75834778acde102caf533c6b37192348c4026011fffa8027a229f230a5343df9418047c4a852d896ea9e6cc1be3bb539fbe7ed6d033f7450781f2238faf988f45ebb34f13d956f6c9a103f06b0b93377bbc8cf09a2ce9d74ef0abf9430e81f28f5923be0a98a73e6386528d59a533fd27658f37bc77ed60cc11a62e2eac7333803c60d5196eb09759ae541af5da37480bca76e5bf0c4a39e9d96421132647bbafd03089f3897a9399faab84541e6fd58a87"}, &(0x7f0000001640)=0x1008) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001740)={<r2=>0x0, 0x6}, &(0x7f0000001780)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001680)={<r3=>r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x4, 0x5}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)={r3, 0x7b, "dcc405178c3799fa37539b95afecc3bd5f1a3eb8feb91f121619ea7a508172baa3b18317cf609a678194a14504b0f50a01faa7bad8b9f35c4fe4b1a3783fead71eaea08f8f269970544ef99cfc9a7a4a1012aeba64d3f49550081ab2877066bc8f1baa03eb97e61df5a66664100797303c5ec30587131132e4022e"}, &(0x7f0000000480)=0x83) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) read$alg(r4, &(0x7f0000000080)=""/214, 0xd6) write$P9_RVERSION(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500001e65ffff0104000008003950323030302ecbafdaba45ee924c"], 0x15) [ 731.270133] net_ratelimit: 20 callbacks suppressed [ 731.270139] protocol 88fb is buggy, dev hsr_slave_0 [ 731.280270] protocol 88fb is buggy, dev hsr_slave_1 15:34:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 731.430128] protocol 88fb is buggy, dev hsr_slave_0 [ 731.435271] protocol 88fb is buggy, dev hsr_slave_1 [ 731.510577] protocol 88fb is buggy, dev hsr_slave_0 [ 731.516329] protocol 88fb is buggy, dev hsr_slave_1 15:34:14 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@random={'os2.', 'posix_acl_access@\x00'}, &(0x7f0000000080)='eth1\x00', 0x5, 0x1) syz_execute_func(&(0x7f0000000100)="0c16b5b598cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec2427d82c4c17950e100c4da7676f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f000e0f0bc030c030363ef80f996603c1896ee4e424c4c17c28c647000026400f0d18c401fe5ff6e3df646736676670664336660fd2938c000000880f01c314c392f80f17720d14111d54111d00") 15:34:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x80000, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x40000) unshare(0x40000000) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9e, 0x200) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 15:34:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000000c0)=0x80000001, 0x4) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000080)={0xcfc, 0xfffffffffffffffb, 0x29c, 0x1c84, 0x10890cba, 0x1cc8, 0x3c3}) 15:34:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f0000000140)="e0fc6d6cc76d46a365f8ec8719251d8eb3b221095897e3c2bbfa257a3c8ccca1878f88dbb3785e9745ce151b41165d4d3f5f1c336bfac9", 0x37) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r4 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000040)={0xdba, 0xffffffffffffff81, 0x0, 0x401, 0xffffffff, 0x8, 0x6}) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xe, 0x6, 0x4, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 15:34:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000100)={0x80000001, 0x200, 0x280000000000, 0x200, 0x9, 0x7}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000480)) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f00000004c0)='schedstat\x00') ioctl$RTC_WIE_ON(r3, 0x700f) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000080)) 15:34:15 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0008004500002000000000f702907800000000e0000001110090780000000000000008"], 0x0) [ 732.140116] kauditd_printk_skb: 230 callbacks suppressed [ 732.140125] audit: type=1400 audit(1556724855.057:14263): avc: denied { map } for pid=21493 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x211}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1, 0x484681) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r0, &(0x7f0000000080), 0x0, 0x700) 15:34:15 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=<r3=>0x0) ptrace$setregset(0x4205, r3, 0x7, &(0x7f0000000140)={&(0x7f00000000c0)="7d19e406d47d30efec98c33a164f33cfe116cc9004f3d68a03098295c93efdd4796aa2ff6b9bdf7a1282d742f0a2cb631f89bfc3a419e3678e0cd2ef3efcf46e351e7a85011b1864be84a3bf266b6135a4", 0x51}) r4 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(r1, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0xfffffffffffffd6e, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) fallocate(r4, 0x10, 0x1, 0x6) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) sendmsg$key(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0xd, 0x6, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x4d3}, @sadb_x_sa2={0x2, 0x13, 0x40, 0x0, 0x0, 0x70bd25, 0x3505}]}, 0x30}}, 0x20000015) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x0, 0x0) [ 732.276691] audit: type=1400 audit(1556724855.107:14264): avc: denied { map } for pid=21493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.390129] protocol 88fb is buggy, dev hsr_slave_0 [ 732.395310] protocol 88fb is buggy, dev hsr_slave_1 [ 732.412622] audit: type=1400 audit(1556724855.127:14265): avc: denied { map } for pid=21493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.476421] IPVS: ftp: loaded support on port[0] = 21 15:34:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect(r1, &(0x7f00000001c0)=@ipx={0x4, 0x7ff, 0x9, "02a4eea03748", 0x7}, 0xfffffffffffffeff) poll(&(0x7f0000000100)=[{r1}, {r1}, {r0}], 0x3, 0x0) [ 732.575336] audit: type=1400 audit(1556724855.497:14266): avc: denied { map } for pid=21511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) dup3(r0, r0, 0x0) [ 732.702016] audit: type=1400 audit(1556724855.497:14267): avc: denied { map } for pid=21511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.804425] audit: type=1400 audit(1556724855.517:14268): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:15 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x2, "e2710576b22db7cf"}) [ 732.870148] protocol 88fb is buggy, dev hsr_slave_0 [ 732.875386] protocol 88fb is buggy, dev hsr_slave_1 15:34:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 732.963733] audit: type=1400 audit(1556724855.517:14269): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0xfffffffffffffeea) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0310000013000000911efc1fb35c22cc6dc37916217d8599b512eceb92bd30961166bf00000000070000000000004d1b39be61fdadec4d8159a56e", 0x3c, 0x24000840, 0x0, 0x0) [ 733.105233] audit: type=1400 audit(1556724855.537:14270): avc: denied { map } for pid=21511 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000280)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "fe2dd5", 0x44, 0x0, 0x0, @mcast1, @remote, {[], @gre}}}}}, 0x0) [ 733.265456] audit: type=1400 audit(1556724855.557:14271): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x1, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/63, 0x3f}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 733.440211] audit: type=1400 audit(1556724855.567:14272): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f4946c5b3aaf5cc61726f5fe4259b75cf9245273f319bd0f0") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x3, 0x3f, 0x5, 0x7, 0x81}, 0x14) preadv(r0, &(0x7f0000000100), 0x0, 0x700) r2 = getpgid(0x0) sched_setattr(r2, &(0x7f00000001c0)={0x30, 0x3, 0x0, 0x2a6, 0x20, 0x1, 0x1}, 0x0) 15:34:16 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000000180)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x78) 15:34:16 executing program 1: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = mq_open(&(0x7f0000000040)='%\x86\x00', 0x0, 0x0, &(0x7f0000000080)={0x7, 0x9, 0x10000, 0x8, 0x100000000, 0x8, 0x7301, 0x3f}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) r1 = creat(&(0x7f0000001580)='./file0\x00', 0x8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r3 = getgid() fchown(r0, r2, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = socket$alg(0x26, 0x5, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = dup2(r4, r5) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) close(r5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000240)=0x22000000000d) syz_kvm_setup_cpu$x86(r5, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000066a80646, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x10000000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000, @perf_config_ext={0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r10 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x4000) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r10, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r11, @ANYBLOB="000629bd7000fedbdf25110000004400020008000400e48600000800030004000000080004003f000000080008003f0000000800030001000000080009000600000008000800bc0000000800070005000000080004000300000008000400020000000800060090daffff0800060005000000080005000080000020000100080001000a00000008000801303b00abd564230e2a4f7700080000000c000700070000000e00000008000500010000001800030014000600fe800000e649bdd500000000000000aa"], 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x40810) setsockopt$inet6_tcp_buf(r10, 0x6, 0x0, &(0x7f0000000580)="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", 0x1000) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x2a7}}, 0x0) 15:34:16 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000000c0)={0xf8fc, 0x101}) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:syslog_conf_t:s0\x00', 0x23) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffe0c, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:34:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x1c000, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000300)=r1) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000180)={0x200, 0xf7fffffffffffff4, 0xfffffffffffffffb, 0x81, 0x11, 0x8}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x23, 0x6, 0x7, "a3a83ba7fd79fcccc8b782ed7f963a63", "3bc743faf34d938fd87abe2841fe"}, 0x23, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000200)={0x20, 0x10001, 0x7, 0x7fff, 0x2}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r3, 0x28, &(0x7f0000000080)={0x0, <r4=>0x0}}, 0x10) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000001c0)) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r4, 0x6}, 0xc) preadv(r5, &(0x7f00000001c0), 0x1000000000000013, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={<r6=>0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r6, 0x7fb, 0x7c0c1d23}, &(0x7f0000000540)=0xc) 15:34:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x2000}) 15:34:17 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ace57b870671363bfc3d63cc1f5d4da337c3f62c21d820"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) fallocate(r0, 0x3, 0x7ffe, 0x8001) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000001c0)=0x3) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) fremovexattr(r2, &(0x7f0000000280)=@known='user.syz\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, <r4=>0x0, 0x7}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000180)={r4}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 15:34:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xcde776260bfb484c, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x1, 0x100, 0x8, 0x74, 0x5}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r2, 0xa57) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x8000, 0x4) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000001c0)) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 15:34:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000200)={0x3, 0x612c}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x4) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) recvmmsg(r3, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000042c0)=""/40, 0x200042c8}, {&(0x7f0000004480)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x8, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000800)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000080020000980300004001000098030000980300009803000004000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000867a117bf23377aa5aeee3d80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00011129628867b0f0b2b9f7c6b0d4001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000ffffffffffff00000000000000000000aaaaaaaaaa2500000000000000000000ac1e0001e00000020f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000300000000000000000000ffffffffffffffff08000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b0000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vfio/vfio\x00', 0x18000, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000007c0)={0xa, &(0x7f0000000740)=[{0x6, 0x9, 0x7, 0x6}, {0x1, 0x9, 0x800, 0xdd2}, {0x8961, 0xffffffffffffff81, 0x0, 0xd9}, {0xf2ee, 0x3f, 0x9, 0x2}, {0x400, 0x7f8000, 0x6, 0x7}, {0x9c9, 0x3, 0x4, 0xda3f}, {0x800, 0x9, 0xb7, 0x4}, {0x4, 0x5, 0x7}, {0x8, 0xfffffffffffffff7, 0x7fffffff, 0x8001}, {0x101, 0x6, 0x6, 0x7f}]}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = syz_open_procfs(0x0, &(0x7f0000000080)='core;T\x80\ndump_fil') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) write(r0, &(0x7f0000000100)="5d9a2a03085d2f800021491752902cb0dc7dce92a312d77f95f09bb5365aeabd754e48a3ac94afcf699e83939e96a8f9791e600e170666650302378c54ffdec2ce762c6f9c6c1e342a17796e1a78f504f36d", 0x52) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000080)={@local}, &(0x7f00000000c0)=0x14) 15:34:17 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4, 0x10000000000, 0x7, 0x4, 0x0, 0x70bd25, 0x25dfdbff, [@sadb_x_sa2={0x2, 0x13, 0xfffffffffffffffe, 0x0, 0x0, 0x70bd28, 0x3507}]}, 0x20}}, 0x44) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0xffffffffffff0000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x8}}]}, 0x13c}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x210000, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default}) 15:34:18 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7fffffff, 0x200000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) getpgrp(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, <r2=>0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000480)='net/ip6_tables_targets\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/7, 0x7}], 0x272, 0x701) 15:34:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2e681d53, 0x10200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={<r2=>0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x400, 0x6, 0x200, 0x80, 0x1, 0x2, 0x1000, 0x4, r2}, &(0x7f0000000240)=0x20) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0xfffffffffffffff1}}], 0x1f6, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:19 executing program 1: mkdir(&(0x7f000085cff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) mount(0x0, &(0x7f0000c22000)='./file0\x00', &(0x7f000015d000)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) r3 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, <r4=>0x0}, &(0x7f00000002c0)=0xc) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x4000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}], [{@measure='measure'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_gt={'fowner>', r4}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@measure='measure'}]}}) 15:34:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0xdd90, 0x0, 0xb4}) 15:34:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000380)) r1 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x81, 0x210040) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) dup2(r0, r0) r3 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000005c0)='trusted.overlay.redirect\x00', &(0x7f0000000600)='./file0\x00', 0x8, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockname(r0, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, <r5=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000040)=0x80) ioctl$KDDISABIO(r3, 0x4b37) getsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x1, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) r6 = getuid() fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0}) write$P9_RGETATTR(r4, &(0x7f00000004c0)={0xa0, 0x19, 0x2, {0x42, {0x42, 0x1, 0x8}, 0x62, r6, r7, 0x6, 0x6, 0x9, 0x8, 0x3f, 0x7, 0x4, 0x5, 0xffffffff7fffffff, 0x1000, 0xaf1, 0x9bfb, 0x6, 0x2, 0xffffffffffffffff}}, 0xa0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'ip6Iret!p0\x00', {0x2, 0x4e24, @loopback}}) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000580)) getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=<r8=>0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000640)={0x2, 0x61, "4171d9bc7a6d5f8fb3fda9abdcb91caf27729269dfd10d2fc464602df095be49eeb046aa091236459fb0367ed9d6fd61b754ea650f77583139afafdd328ec9a815b387b9123e8764f38af4c0bf69a553301ee80df3906ee5e90376a4bf602f5c22"}) syz_open_procfs(r8, &(0x7f0000000100)='wchan\x00') [ 736.550120] net_ratelimit: 20 callbacks suppressed [ 736.550125] protocol 88fb is buggy, dev hsr_slave_0 [ 736.560274] protocol 88fb is buggy, dev hsr_slave_1 15:34:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000340)={0x2, 'team0\x00', 0x4}, 0x18) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x2b, 0x4, @thr={&(0x7f00000001c0)="3232e3d53d34dedd23d7c05a5527d4387b8ba54bfd9e5275d72fbbd4064e7f31e5db387ee7da96f445648b3629691957d8f6b3f54445ed08dc108e219edd032b9e678fb9ab0b1a4d2f97c55711f72c3eb9080d7286955e01cc8b8db8011b18d8b3c88ae3", &(0x7f0000000240)="7eb71ff7f1d5deb74f46a9defcbf513a2f5ff8d842beb5279662b77af3797a9621a30f40de6c5704651d1448db8f9976c223557de93d301e3e71fd01d30171d736acefc6244b2d653c707f0eebf0ee6336bc2e737254a5750afbc089d77725bb91b83bb81e5002109c4210217c582a407aa9456e30"}}, &(0x7f0000000300)=<r2=>0x0) timer_delete(r2) syz_execute_func(&(0x7f0000000000)="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") setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000380)=@req3={0x7, 0x5, 0x100, 0x4, 0x0, 0x47c}, 0x1c) 15:34:19 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x80000) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) socket$inet6(0xa, 0x0, 0x478a3133) [ 737.030167] protocol 88fb is buggy, dev hsr_slave_0 [ 737.035326] protocol 88fb is buggy, dev hsr_slave_1 15:34:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x100000000000e15, 0x90000) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x1ff}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4080, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000002c0)=<r2=>0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000480)={[], 0x2, 0x50, 0x6, 0x8000, 0x6, r2}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x1, {0xd7ad160000000000, 0x0, 0x5, 0x308}}) r3 = accept4(0xffffffffffffff9c, &(0x7f0000000740)=@generic, &(0x7f00000007c0)=0x80, 0x80800) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000280)=0x9, 0x2) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000080)) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000c00)='SEG6\x00') rt_sigpending(&(0x7f0000000240), 0x8) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x4c, r4, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x2, 0x9, 0x2, 0x8000]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000ec0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000c40)={0x214, r7, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x662d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_LINK={0x124, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x69d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x44be}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000f40)={0x1, &(0x7f0000000f00)=[{}]}) r8 = add_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000000b80)='keyring\x00', &(0x7f0000000bc0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, r8, &(0x7f0000000b40)=[{&(0x7f0000000580)="46676cc272132f24948b42451fe4e7ac7d7c501328d34b7a06722c2265872f8d0705cbcb75f23ae41b8a136ca800516b6c872bbb939016e7b09a921d94db58e4e892a62c0ef4e6f5b115dcf82168507e49202ede362cfd8512d27677aa3abf19045dd054c59be0b53e477bafc3fd9184412ee6eb81dda5be1488d0aea949ea57861cf5a2f1a9a322380c3afa1fb1a5903c7f93b925852d4a7c46eda7794a4010c1d565c9aa5e0474b14dcc0cbbe8e3f3582085c2fc62b7caf39795e6ae526668b071d4337d7560f18d0f6286f0bcc8b798c82f4ef2dd4369082831a32c640cbfa9524474bf0b", 0xe6}, {&(0x7f0000000980)="fe170aa26a7355448e12af48bb767fdedcac5971d53316c0151936f69b224a4858d038f702471c7596de4278ece9b2a2d4a03ec644970c0e514c25626debaca21303a9ccd5387f5a999815516a68c486fa019e4cb0b899d26077c6af5aef27365b4aa26d6e506b280132ed6fd6162f5a2b23ebadeafd42ac1b08b39715e0f4b3e7fb12a563ef6e8a934a8a1aec38c537689949e7928ad4d6aca3539a175b8e0eacfbb9e1caaf181966730206c5da9f3c0ff4e6d42e531e387401984bce4d6a011fc14fc3cff48ac03673d073e6e76355458e087f5a828bee35094d16881d53a542e2e4657d3e64e0286e", 0xea}, {&(0x7f0000000680)="ea7d39ebd92bb01b6d265a41f6ce23817fc8da2cdf6793b8e9994e7fa0290dadf70cf1b3e244c62720557be1311b2e7fa595a3c9138773667ed92a524e4e81251ec57dd020e4ff3a72e2cf39116d919e80372a250723cfce97325c84d9a25b154c7ae539d365ceac4c8c270e3e0802555888b325844632b4449980f5b3e344a5dd4d59d38079baf65496d395c3", 0x8d}, {&(0x7f0000000a80)="fbaabb9c7142cf94977abefc2f3186e28fe667df0a6199d4f1f673565ebf7d55d153504bd5424939fdf75c016837e4b1ff0b29a1ca909439ae97abbf9281f6ecbb8cb51808154f25ad9d3e665337c54953603c78966c8982e8f9e8918b386c549b26abd1f5510611dec3bad4218a2abc4632dc75f18c2d4fd5c581d6cb5fcf6faf228a74e6f9dd55aca9a5eefb1c5450ccfc0fc7d458b2d3c8aa6eb3484a", 0x9e}], 0x4, r9) preadv(r6, &(0x7f00000017c0), 0x1be, 0x700) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r6, 0x40505330, &(0x7f0000000100)={{0x4, 0x9}, {0x7fff, 0x5}, 0x8001, 0x6, 0x100}) 15:34:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x6, @dev={[], 0xc}}, 0x30, {0x2, 0x4e24, @loopback}, 'ip6erspan0\x00'}) r1 = gettid() prlimit64(r1, 0xb, &(0x7f0000000180)={0x3, 0xb2ca}, &(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000240)={0x5, 0xd6b, 0x5, 0xff, 0x1f}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000003c0)=0x8000, 0x2) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000280)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000002c0)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0x0, @rand_addr="8b2e25237522887a0d3c95b4f6a6b57f", 0x10001}, @in6={0xa, 0x4e23, 0x3ff, @remote, 0x8001}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x23}, 0x5}, @in6={0xa, 0x4e21, 0x10001, @empty, 0xfa8}, @in6={0xa, 0x4e22, 0x101, @empty, 0xe50}, @in6={0xa, 0x4e22, 0x2, @empty, 0x8}, @in6={0xa, 0x4e22, 0xf8, @dev={0xfe, 0x80, [], 0xa}, 0x2}], 0xf4) sendto$inet6(r4, 0x0, 0x0, 0x20040880, &(0x7f0000000040)={0xa, 0x4004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f00000000c0)="cc", 0x1, 0x0, 0x0, 0x0) [ 737.164581] kauditd_printk_skb: 237 callbacks suppressed [ 737.164591] audit: type=1400 audit(1556724860.077:14510): avc: denied { map } for pid=21632 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000050d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x200, 0x9, &(0x7f00000016c0)=[{&(0x7f00000000c0)="9b207ec3b53a3f060975b1ee41080c194aefcedb76ee8afe24d4292dfd99b5d2e61c2ccb56412d855aa3fa4d5e48469e33c5de8806da024a98eda2aea754e875e1b733e7a6781baea330b88031f7da4f0eaf8d5fda4c77c09ea3b72c340c9bae7652e7e2350761cd01b5a66969c49bfec3cf2245105e", 0x76}, {&(0x7f0000000140)="0978281bc464387299797a7ce45175895b5bc1a509dd9db84c20d6d9ac957cc35ccce1d1468960d8a77b67a3b53ef87808acff94331a3776bcedc0cf61c9fc2d910052baf3ae875ec26d443ad0bb596c51ed1c3afabe5b82ddc40979", 0x5c, 0x8}, {&(0x7f00000001c0)="4b908bceeae69c0fadaa3b4f0192701cbbbe99734b0385379c5b1ac67780d777317e4cba432c9f6ed83e3c71ecb5a1d115cc34784abb31440eb990339f5dab4e5e8d1367cead0350d032207545c9b71cb701c926e8c33072c4cd3b010f30cc815cd5b8edcd9bb152c7b70824e90cf1", 0x6f}, {&(0x7f0000000240)="18a1f413944d06b0987ebdb5059949d3a0b50a10b6ba9b14ecd72c568f9355f704c5acd28a428c0b6040106c9906ef55041df103a2cc03c434013fec5de3d0b576b9471d8be29166986f8cc8d3ba5021738f98b4a83ffc1c84f3f83cb47d7819b47ab8d626075d43bdeae7f0de19aa414e23acf06b89a6f46db3daf8763dfa99b56653d7fe121a165803b95eb4b482708a5d7d950cd2149a4fbb4ea9ac8c9b397f3ff45e826211a7fa4f59e136ef3740859cd397c7248a9ce27ec822332892dc8388057b7a01fa06d4b27a5dadf9ed7d719adedcecd277a3d6200b580fc260e2d34d", 0xe2, 0x6}, {&(0x7f00000017c0)="a388eaadec18cedbe16224d3df152495fca2e3e84dd2b84520bab77be8828c25d32f7ddef8dcfd57c98f361ca166509f675a34a490986ea7cae307aa6b8d823118a38297bc19af9bff120a1ad0e0bfd13ec917479c518743a6cc99578b41e465bad57d06f5ee72e6742e4322d6db8540e882efc7b9d0d43cb62c6c68588cc6e1c22ab75d4dd35e61c9c4c4431c00dd6e", 0x90, 0xe6}, {&(0x7f0000001880)="2e3a78146532a01626ce66154a7befc42bbbccc143ee726e6cd52e44154a7ace5ae4229bc2062112e02ff84e9e13155d13d708f9e3b2c2b8d1eb4d92efb7777d06dbdd335ad3bf1f36a172aad48a5b1d1fd940f2d9b3e6e0d81c275127f43feebd386c662f61a6db1486cf9d24af06a24e990029c876458f910526e4a06cccac3ee171cd681d3501920dfc3b72036729057cbaf20741c23361eef53facd20e8d0e9cf7a3784a4c29f817d4ed3323b429f5a7daa4aa5647a3e2b6e61087bbaaf68291a76c1db99859594b7a38103deab6e8fc2f93c7f0c5deb3ce29e1a7e069a0c84028d161", 0xe5}, {&(0x7f00000004c0)="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", 0xffffffffffffff73, 0x5}, {&(0x7f00000014c0)="f642ab4a2b6dc7bf23607b413ccbfbc5ab3730d85916e0084ace2add7dcd2066f31df269725f57bfea9d3f4dd8d2a5ea4a23d895f74848784558b20f768c9541c3f6cf6580bd2d58fa206cf2ec92a8d18c305af8399f95fcb085caf23d1fb35c4e4b691fb48f52f2080346ac49753af6ec74ec6e6bb911967529f15abe285571c72b18fc7fc8b2c12538caf2f634758f390624e52de3be8fdf7e4cb5fdf1477f482119d570d6659445355c0f79c110db90f31c69ff60fe684d6ac815d16d20c553b8b1af94ffe8ecfe7b76f27727d6eac46ac146c293", 0xd6, 0x4}, {&(0x7f00000015c0)="68296707e1d5824c65741a35aa686843ad438e1031b421463db81187ce0d6de2f3c89bf04c8cd77081a53bf5e0ef288cfb4965411861491870a62e976ede49fd6bb0bfc05b420fd17894309cd2e594afe0aca53f24d469a6390d253dd152774cfdea793e761f4cc4c06720ba66b2429f0077488a802887b62b53cbd4a201528b901cfbfb8a417e152d2b4dea5deb40b37554a94b3129653a817aed7781f33e48eddb5c5b83fa0dd2bf4f763f32fe0c187dc745cae839c8328202c234c0793df39a0c2fd742819a1a2cbc509f6e6b68d3dffb699a26c534f43a351902b29be91d5db47dc66ba0", 0xe6, 0xc8e}]) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000019c0)={0x18, 0xf, 0x2, {{0xa0, 0x1}, 0x81}}, 0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340)={<r0=>0x0, 0x3}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r0, 0xbc, "182ba1662fcd1f36cb1db20bdfc8d4f95e5f63e922ee05ee1eee4ea3c0cd78558c1b083f77f257d912d66d8b35cb54f47eea762c4fe33d1e8755c8332c629a95f536751c143a680dd4dc48c73d9b9bc49141648bb7cfcb11eed726803318f2551a3895cff2417498aebe8a3b994eb9855fdafce2a1b265cf9c6b9860313bbb39b0286cd56a60a988873b4ab404467ac4462c3d1d495fe55f5853a0f1b3d90b0e61c4d0db6dd865ed35d22de5ee7986bea1340bacf936190b501579ee"}, &(0x7f0000001980)=0xc4) [ 737.280119] protocol 88fb is buggy, dev hsr_slave_0 [ 737.285281] protocol 88fb is buggy, dev hsr_slave_1 [ 737.320190] audit: type=1400 audit(1556724860.137:14511): avc: denied { map } for pid=21632 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:20 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e22, 0x1, @loopback, 0xffff}, {0xa, 0x4e24, 0x100, @empty, 0xfffffffffffffffc}, 0x1000, [0x5, 0xfffffffffffffff8, 0xfb, 0x9, 0xe537, 0x1, 0x0, 0x37]}, 0x5c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}], 0x3f, 0x700) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000200)) getpeername$netrom(r2, &(0x7f0000000080)={{0x3, @default}, [@default, @default, @default, @bcast, @bcast, @null]}, &(0x7f0000000100)=0x48) 15:34:20 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000002640)={0xffffffffffffff80, 0x101, 0x5, 0x100000000, 0x4}) sendmsg$nl_netfilter(r0, &(0x7f0000002600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000025c0)={&(0x7f00000001c0)={0x23e8, 0xa, 0xe, 0x420, 0x70bd2b, 0x25dfdbfb, {0xe, 0x0, 0x5}, [@nested={0x1294, 0x1e, [@generic="e4a94be1f371089c115e2937ccaa25ef92217b3669dfcde1eb44943ef26bd9ac61fcb9c16532c4d126360ae8f2e30d5670f17df0a1356485f183b68d1e8776e606e5220234d36d8f", @generic="f5f353be7e03a23b88303d5ca982919b308770aaeab5ef31c8346f80eb3a739d2b218c34975321637eca57cef5196446dd77c070d8b68623fdd673517dce413668fec704de0ffad123e96b4e7145fee8fac7f93b4e9f7a41631159b33585a401c39e7d91b5850cda9c3e50a5b12efc7fcc7529b6bd797599c3260d9996a5f5c8b5b6ebbdb3dd0b82c7b340d480a8ac604ccbfc4c1eb567547fdb906f5e8e62b0bc04be4ad632a412eac69e8868ddf883f75c3bec83fe81ad07a302f1adc023b8b5360ae260c6cb83e1d538d5", @generic="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", @typed={0x6c, 0x60, @binary="1b750d1efb47693a5b6e9fb5b896a4e96bfb9d6963bf925ef756de9476d2872ebc45c1acbc13ba9cad003c10a422a525319f266444a863e5960c25d95cf4ecc08739b879db9eecbf97dd197e16cdf442252bba5aadfa8c2505f61f784d4329adc51355cdca63"}, @generic="e2e52391575aeb73e76433df853d82ea80692b9faccfb565ac98467e7c976f027112f231959d49a05f13486f18321e", @generic="ffa0c96eed82f18161f222cd1c0e40c71bb6e97fca33c3d01bd261df07d9bf13c6d6ac8a473d1a9d01aa0d13643957b11dc7cd85ee09d671f56dccf6cc1774dc705978120c2a85fd8b20c53d58834a8df9c1c394560796702488e7c9347d341d8905704830d63f58f417995d675ad1cbff809182a0f0df9710dfd6c7f24e14d37c72ce5d483a619618d8e8fb3663d88c5d50993a06ba4a7aea271e73935dabef1427d97a2cdd0b164250e960f4b47285798dfc3ae9e90ddf376de0f6cb2ca94c22e811fd86775f404ae1c488c7068f051f4823d54e7792c092171cf67627b187"]}, @nested={0x10ac, 0x22, [@generic="92d77021a015f685c948cd6c30c5aae00f87f671fc6e58e340b05c1a1f0b539476e92e6a064d67724f20433a701e638cd6707123acccd5913a3b97b6016d80401547a24fc7d11099f2a956bc69dab147f071930c45d7820541ef875634dd2b8f6e217b18a1f6391ca4216b01be030164338c4fdc618fc0d1f9b3b0f2cdacdd39d6d827da05402982ab370112856c7091d85e00453e783f2be10d8363521f4460b6155c0768", @generic="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"]}, @nested={0x3c, 0x82, [@generic="ba27a0dcb625183393170f55a6395c011eede331c76f85f14d17f0280c2b17135f2e8f5c4dd6", @typed={0x4, 0x6d}, @typed={0x8, 0x48, @u32=0x7}, @generic="a033db"]}, @nested={0x58, 0x60, [@generic="d47294ea62dd6557b36a7f2cd8f8f3836ab443a7ecad518b931ac9cbb546f3c8f4ae7f90dec7a6f7808698b1cf42f69477e46c2da4ad2df5a2156f730838d7444fde735d98d9c7ed8dc55c36cb7255d5b4f6b653"]}]}, 0x23e8}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") setsockopt(r1, 0x1, 0x8, &(0x7f00000026c0)="671c5d7754e12d68fc39e856b6569288ebd722645f27296dcdfba2f6cf764bb934b210f6321c06123aa9594121545e1576ae3cc8390e4e332036037a3881ce26587dd9f1b809cbb110a1edab04eff88044972ec31b9cea8c7f5fd8f4923c98787b567567353513386fd8cfd9cf8365", 0x6f) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000002680)={0x15, 0x0, &(0x7f0000002640)}) syz_execute_func(&(0x7f0000000000)="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") [ 737.490098] audit: type=1400 audit(1556724860.157:14512): avc: denied { map } for pid=21632 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 737.514912] protocol 88fb is buggy, dev hsr_slave_0 [ 737.514965] protocol 88fb is buggy, dev hsr_slave_1 [ 737.670157] protocol 88fb is buggy, dev hsr_slave_0 [ 737.675320] protocol 88fb is buggy, dev hsr_slave_1 15:34:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f00000000c0)={{0x3, @netrom}, [@bcast, @rose, @rose, @bcast, @bcast, @default, @netrom, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=<r1=>0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x0, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r3, &(0x7f0000001440)=[{&(0x7f0000000240)=""/61, 0x3d}, {&(0x7f0000000280)=""/17, 0x11}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/228, 0xe4}], 0x6, 0x700) [ 737.801392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:34:20 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) vmsplice(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)="7896325d5883c3787930400357ab6cb74ab750d4b1f12f906b56683d974e48f8964a63c7a042ebdb7349076c9764986295098bbf7455018bf6db5678b727207e7d2f542fbd3cff9075b6bd5559c5018942a28fe6e1608a2b1842ceb740b2d09b9db377bb116ba880876e79c26bd7d5ddd46ff9a3d9acf4999f407fef833cb1ba65aeb7b3e1b26c1c8cc9feb8fe588520e2349126ec2a6cb19e484e7454c9ce8c085ed4d767ff979086f96a800ef2cce9eb4c6f1a03", 0xb5}, {&(0x7f0000000280)="572724ee2431883e54d394b95854b9f9a71a064f98f4688c2e853c6715165855d8d1225450b2512bcdee9a5faa932d95bb70a4f5c49dee7907f85be21194c8669dbf15fc4f93cee4de228fb4da53f5825c9654c7dfca48e7fe13192c3fc9883a2ba7e70f09ab999092ed57909067156207f101dcb595fd82bf2549d9af82e35cf24158b91dabca62b07b0faa9056241e3be49d83b11b219dccd4b35ac346c998", 0xa0}, {&(0x7f0000000480)="198e402fa20d874f8d40e7c8d611c10fde0364d0b05c65e81ec773cb6fafb0153b8f694d55a9d13f35c1fc15c31d28b9aa1c9485c194106ad89a0d699e3622fc575852f6395dc4ce03e16dfe890f806520ebaa75558166b72d6d3cffdedda2928885944d77a1c6c1e482943442f4a3391496d18eba3be6bd2b3d974b6c2932ae7f3b72faa57130b73a98b6b4dae590a79526a401391fcf59374d79ce297cd9eeb029e77b23cbcc98ec46a55b8e1de6fa7a45dc5f6ac131ca31f8106e3c2d6d05e8794617d187a546e1f53756cfc73b22de3f2b33f4ad37a19077794f3edcc5002e5d4a1efab3348f9ef584f5f7bf57242943bc1a050a1b", 0xf7}, {&(0x7f0000000600)="f66eee66e0e6f6f771d19a34fe320bde87bf43c94e424ec4fbf87a595d5c007e6f77332c7affa62c4b5c67fbbf2d8861b34f3fb8b71dac9f28cce25f3590b38bc3870c9e74a171d13d1302f1e83f28159a9ede54f478561d59db39dbedabb0636b9917cbde38a5d2bb461209f922c99916bc864d5764fe605b7222e79b699a91772ed4837493bd51478cf369f29a9edea9b4d83628ea", 0x96}, {&(0x7f00000006c0)="92ddd90256a464056852223404fb5ff4300998f3a6c136e5095522e759fca2f6d0666f3ae69b171346b3b641d41facce1ab43e55eb2386b20a165633bd9ddce1d24556c40c5bf74e8d2ea0e98f7391905701e348964c24a40e0aae81bac4cc4cc425f30f17a133beea93b6d55474bd11a1f92799d01f178c79ca85bba7c6c13f59cfae4d2a72d567c1eaebb05d4bfa5e8b8b67b1eeed6894d27f252e57b53c29ce1b8d4498dc0b440f418011703a58698a7c5e6fe02109b0e2c3f03bf7528cf3", 0xc0}, {&(0x7f0000000780)="a543026edf32ac1d4c0e06964cfce9c02a7beb982c42aad9dbbc3b0aa26ca277f217e93c64866c376292f467aeb01cf326d12b97a73a4bfc3d1eaf51d6092004d4cb34ab4748eafb338042ffcef9f0a1a8053711638f77d38854efa6d44ab270502114fd35c3e7f7b570de91f06d722d301f69304c553a56ef556bf03a88569afb8128bbd21e344805b3f810d78743750dfea512ac2872be477fb51792ca76d03c80e4c5f3ce8be39c31e4ab476f8ff28bfb5d468e4c0879b15099501d7c622bf2cbc83085c8a6388aa4200cd811e174f42f20a92b3688", 0xd7}, {&(0x7f0000000880)="9d772e5338c209426566b7d2af44255db5ff5a2482501ce38e60013bcf99a53ab3f7736f9598a3337717789e49a3d732eec45d8d0fdd0ab121892e22fbfa5f9ad3018fc656471d2bfa5b0f606f25d881e987660a6762a57b799c8ba43f23540f321c3391105284da5cef1fb3d9bf9daeefec64d9fb0843fce0cf4a269cdf73899d9cdb08d5de4c5969a3aa7b5a560b", 0x8f}, {&(0x7f0000000940)="ece654ab921aba2bbabc103e5cb3d0390312550d96cbb1e15e20d9aee9ada7b27d2ef24935995fd26fab555c32b28bb8a2b46146cbb163aa7aff4ba7c343dea9489c626977feb7c9cf49f0733d99d4da7caedfcad82713708d4202494ed0fc676bd2bab81615527a3a9c1fdaf5288102df1e67a68050276f3759d772b681202dce3036815955670a74c28030feea2901c480179167bd164d4b94f2a5ed19f8c5986d962e68c34a03904224", 0xab}], 0x8, 0x9) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 737.828543] audit: type=1400 audit(1556724860.747:14513): avc: denied { map } for pid=21652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:20 executing program 2: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) r0 = socket(0x100000000a, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000080)=@default) sendto$inet(r0, 0x0, 0xc8, 0x0, 0x0, 0x2d7) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={<r1=>0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x3}, &(0x7f00000001c0)=0x8) r2 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 737.924941] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 737.968916] audit: type=1400 audit(1556724860.777:14514): avc: denied { getrlimit } for pid=21646 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 15:34:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x3, 0x8000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xe234, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x3, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000002c0)=r3) r4 = socket$inet(0x10, 0x3, 0x40000000000010) sendmsg(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="240000001d0003fffd3cc0023da2830101faffffff86c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0xe, 0x0}}], 0x88, 0x2, 0x0) getpeername(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000040)=0x80) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x68, r6, 0x300, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xdf46, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee1, &(0x7f0000000200)={0x0, 0x0, 0x1, &(0x7f00000001c0)=0x1000}) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000640)={0x80, 0x20, &(0x7f0000000540)="20c49b7c1d9330d481d81cf3dc6bfcb984d74b4de05766e86c06a21f551e2a4a90302531a3fe71c57ace827e37d59968a9688f693e36724097e026bf1bda04418bc328425b79368f23380df15bb3a2d7f3ec114f71e902219cf3c7fc4f4622010250dde71ff654417331f6c4f9c90e8399a5a7be2bc023e04bfb16b48658041f61cb4b127a2a005423d201185d4b12192f744495e8f9d0a146ff783e5020e45943ea73b70bbea3fc2ab71c02f40489a29ad6743f6faa2da6b154cd1fe0692a174992889b652d33ea552d63dee8f1f2fa9042790cb438ec", {0x9, 0x8, 0x7f777f7b, 0x7, 0xffffffffffffffff, 0x9, 0x7, 0xf465}}) [ 738.131161] audit: type=1400 audit(1556724860.837:14515): avc: denied { map } for pid=21652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/51, 0x33) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc000000003f319bd070") fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/arp\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r3, 0x0, 0x8, &(0x7f00000002c0)='-nodev+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(r1, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={<r4=>0x0}, &(0x7f0000000380)=0xc) r5 = getpgrp(r4) syz_open_procfs(r5, &(0x7f0000000280)='net/ip_tables_names\x00') ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000080)={{0x1, 0x8001, 0x8000, 0x7fff, 0x2, 0xffffffff}, 0x1, 0x3, 0x0, 0x7, 0xe3, "2e0dc3024d028312745f770490a5e8907fc2140386d4f39e788f3744aa6c9b2d675dca988a82ea9f4d1ead166f8e2df2cd0c8ccf39c7cc4db34dcd673d46df52d46dd2f61ff5b72159e8d18c76cf14fbd077b4bd6e1ba0e542f86a4b2696f94c7d12be17cf150a2768624fa4b404d84c68b12fc2191ad75a2890808324f0763a"}) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) [ 738.302237] audit: type=1400 audit(1556724860.837:14516): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="fdce1565cc9b4a65140adc19f5dd08d1eac57ea8e95dd9b9933bb13a48be22fc52c7ada9899876f86cb32fb5977b3b7bc982cb3b") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200, 0x0) listen(r1, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x3, [0x0, <r3=>0x0, 0x0]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x200}, 0x8) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x2, 0x4) [ 738.497105] audit: type=1400 audit(1556724860.837:14517): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.676436] audit: type=1400 audit(1556724860.917:14518): avc: denied { map } for pid=21652 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.880164] audit: type=1400 audit(1556724860.947:14519): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x4000000000001}, 0x2) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x0, @rand_addr="ecc0accb5ed80302d97af1e2b57a9d15", 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000280)={<r1=>0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x11}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') write$P9_RWALK(r3, &(0x7f0000000100)={0x3d, 0x6f, 0x2, {0x4, [{0x0, 0x3, 0x6}, {0x0, 0x2, 0x3}, {0x24, 0x3, 0x4}, {0x2, 0x4, 0x3}]}}, 0x3d) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 15:34:21 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000000c0)={<r5=>0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r5, 0x8}, &(0x7f0000000180)=0x8) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="020e0000000000001b000080ff030000faffffff0b000000f8729d0000000000010000400600000003000000a51700002400000000000000"]) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:21 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={<r2=>0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000180)=',vboxnet1/\'\x00'}, 0x30) syz_open_procfs(r2, &(0x7f0000000200)='net/snmp6\x00') ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000002ec0)) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, &(0x7f0000000240)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000280)=0xe8) getegid() ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000a80)={0x52}) getgroups(0x7, &(0x7f00000007c0)=[0xee00, 0x0, 0xee00, 0xee00, 0x0, 0xee00, 0xee01]) fstat(0xffffffffffffff9c, &(0x7f0000000880)) getgroups(0x5, &(0x7f0000000980)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee00]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000940)='./bus\x00', 0x0, 0x109) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000006e041c7700fdff863809aa0063b8f24252b1d85cbf1d0000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b98d585cebd96033ccfdff0664cf"], 0x56) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 15:34:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$nl_generic(r3, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400962c85f87a5c2c0000000000000000ff"], 0x14}}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) ioctl(r2, 0x2, &(0x7f00000000c0)="80144f46bb0a877b66e9b1e0157df127e044d7f8e73ae167a9b1db") 15:34:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2b, 0xa, 0xfffffffffffffffa) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) dup3(r0, r1, 0x80000) connect$inet(r1, &(0x7f0000000200)={0x2, 0x1000004e23}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f0000000040)=""/21, 0x15) 15:34:22 executing program 1: socket$inet6(0xa, 0x0, 0xb6ba) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xa8, 0x0, 0x0, 0x863b6b7602ec05da) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) setitimer(0x3, 0x0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x284800, 0x0) r3 = openat$vfio(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r4 = getpid() r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x6080, 0x0) ptrace(0x4207, r4) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x10010, r0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6, 0x1000000]}, 0x8302}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f00000000c0)=0x78) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xc0400900}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x184, r7, 0x411, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x96}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff801}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ad0d73e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd4ae}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfa59}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}}}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @mcast2, 0xffffffff}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @rand_addr="2f3ba7db37c77c89a883a108e6d5a4f7", 0x1000}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8001}, 0x40814) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000001e40)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001e00)={<r8=>0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000001e80)={0x5, 0x10, 0xfa00, {&(0x7f0000001c00), r8, 0x1}}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) process_vm_readv(r4, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/71, 0x47}, {&(0x7f0000000640)=""/37, 0x25}, {&(0x7f0000000680)=""/184, 0xb8}, {&(0x7f0000000740)=""/171, 0xab}, {&(0x7f0000000800)=""/139, 0x8b}, {&(0x7f00000008c0)=""/125, 0x7d}, {&(0x7f0000000940)=""/88, 0x58}], 0x7, &(0x7f0000001bc0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/183, 0xb7}, {&(0x7f0000001b00)=""/173, 0xad}], 0x3, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) 15:34:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000240)=""/133, &(0x7f00000001c0)=0x85) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @host}, 0xf) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000180)) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000440)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r2}) syz_execute_func(&(0x7f0000000000)="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") [ 739.797889] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=63621 sclass=netlink_tcpdiag_socket pig=21703 comm=syz-executor.0 15:34:22 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={<r3=>0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r3, 0x800}, 0x8) r4 = dup3(0xffffffffffffffff, r1, 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xffffffdd}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0xd4, 0xfa00, {0x2, &(0x7f0000000080)={<r2=>0xffffffffffffffff}, 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @mcast1, 0x66}, r2}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000040000000000000000000000000000000000000000000000009ce9a679fb701f44080000f553b94c14ed224dc1979348d7a086d2a01a8b8c681f1258e62321e94aad7325b76db6bbb33967c0d5e96838dff61e00fed07b55dfc6ac5554e066cc86a4a19deee1cc1753275db3023d77eccc89af960175e0e0d4390ebb2629486b750961ad03ba4518b7dc3c2dbd6d866d7006290a7e732b9c"], 0x28) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000180)) getgroups(0x5, &(0x7f0000000080)=[<r1=>0xee00, 0xee00, 0xee00, 0xee00, 0x0]) setfsgid(r1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000200)={0x781, {{0x2, 0x4e21, @multicast2}}}, 0x88) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) 15:34:23 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)={0x0, <r2=>0x0, 0x61a}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000001c0)={r2}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:23 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f00000000c0)=0x40) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:24 executing program 2: open(0x0, 0x1000000000608220, 0xffffffffffff7ffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000500)="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") 15:34:24 executing program 1: mkdir(&(0x7f0000000140)='./file1\x00', 0x800) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757070657200000000800100006c65302c6c6f7765726469723d2e2f66696c02fff6776f23b2660f726b6269723d2e2f66696c"]) creat(&(0x7f0000000080)='./file1\x00', 0x4) 15:34:24 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r0, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/86, 0x56}], 0x1, &(0x7f0000000140)=""/246, 0xf6}, 0x8}, {{&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/63, 0x3f}, {&(0x7f0000000300)=""/24, 0x18}, {&(0x7f0000000480)=""/131, 0x83}], 0x3, &(0x7f0000000580)=""/13, 0xd}, 0x80000001}, {{&(0x7f00000005c0)=@ipx, 0x80, &(0x7f0000000740)=[{&(0x7f0000000640)=""/215, 0xd7}], 0x1, &(0x7f0000002c40)=""/43, 0x2b}, 0x7}, {{&(0x7f00000007c0)=@nl=@proc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000840)=""/45, 0x2d}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000000940)=""/25, 0x19}, {&(0x7f0000000980)=""/184, 0xb8}, {&(0x7f0000000a40)=""/68, 0x44}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000001ac0)}, {&(0x7f0000001b00)=""/91, 0x5b}, {&(0x7f0000001b80)=""/220, 0xfffffffffffffeae}], 0x9, 0x0, 0x2dd}, 0x7}, {{&(0x7f0000001d40)=@nfc, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001dc0)=""/89, 0x59}, {&(0x7f0000001e40)=""/91, 0x5b}, {&(0x7f0000001ec0)}, {&(0x7f0000001f00)=""/190, 0xbe}], 0x4, &(0x7f0000002000)=""/226, 0xe2}, 0x8}, {{&(0x7f0000002100)=@nfc_llcp, 0x80, &(0x7f0000002180)=[{&(0x7f0000003180)=""/4096, 0x1000}], 0x1, &(0x7f00000021c0)=""/135, 0x87}, 0x2}, {{&(0x7f0000002280)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002300)=""/163, 0xa3}, {&(0x7f00000023c0)=""/99, 0x63}, {&(0x7f0000002440)=""/182, 0xb6}, {&(0x7f0000002500)=""/5, 0x5}, {&(0x7f0000002540)=""/181, 0xb5}, {&(0x7f0000002600)=""/190, 0xbe}], 0x6, &(0x7f0000002740)=""/117, 0x75}}], 0x7, 0x40, &(0x7f0000002980)={0x0, 0x1c9c380}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000002ac0)={<r3=>0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x99d1, 0x5, 0x8000, 0x4, 0x2}, &(0x7f0000002b80)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000002bc0)={0x4, 0x5, 0x4, 0x3, 0x7, 0x5, 0x9, 0x6, r3}, &(0x7f0000002c00)=0x20) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000001ac0)) getsockopt$sock_buf(r2, 0x1, 0x37, &(0x7f00000029c0)=""/217, &(0x7f0000001ec0)=0xd9) [ 741.406505] QAT: Invalid ioctl 15:34:24 executing program 3: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x400000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x4, @dev={[], 0x2b}, 'eql\x00'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3179d070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 741.670120] net_ratelimit: 20 callbacks suppressed [ 741.670126] protocol 88fb is buggy, dev hsr_slave_0 [ 741.680222] protocol 88fb is buggy, dev hsr_slave_1 [ 741.830151] protocol 88fb is buggy, dev hsr_slave_0 [ 741.836815] protocol 88fb is buggy, dev hsr_slave_1 [ 741.910146] protocol 88fb is buggy, dev hsr_slave_0 [ 741.915344] protocol 88fb is buggy, dev hsr_slave_1 15:34:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f0000000040)='security\x00', 0x9) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000080)) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x18000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) sendmsg$rds(r1, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 15:34:25 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x5, 0x4, 0x946) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000480)={0x81, 0x8, 0x6}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000003c0)={@generic={0x8, "954cfebce7442e5e82ddc77217c7ed0f634c53c1421d42fa82251c8d4e4caf9fc70a5cdf4b84a081be416610973c99e867e8aa3a86733457978245fdd2643101a08cb19ba0f4afca7133824b8acf2ea80985efc12ac4105db58a748b0be165806f6fe4abf48be3d086d45ada341e9413d2977c11daaa96514a96717f0962"}, {&(0x7f0000000300)=""/121, 0x79}, &(0x7f0000000380), 0x2}, 0xa0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) bind$tipc(r2, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x3}}, 0x10) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, <r3=>0x0}, &(0x7f0000000280)=0x14) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'bpq0\x00', r3}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={<r4=>0x0, 0xfffffffffffffeff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r4, 0x7f}, &(0x7f0000000200)=0x8) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:25 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 742.313265] kauditd_printk_skb: 174 callbacks suppressed [ 742.313274] audit: type=1400 audit(1556724865.237:14694): avc: denied { map } for pid=21754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 742.436950] audit: type=1400 audit(1556724865.267:14695): avc: denied { map } for pid=21754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x100) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:25 executing program 2: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='^posix_acl_accessppp1\\\x00', 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x1000000007ff, 0x0) r2 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0xfffffffffffffff8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}) r5 = epoll_create1(0x0) fcntl$lock(r5, 0x100000000000007, &(0x7f0000000100)={0x0, 0x0, 0x7fffffffffffffff, 0x3ff}) keyctl$chown(0x4, r2, r3, r4) syz_emit_ethernet(0x0, 0x0, 0x0) [ 742.579403] audit: type=1400 audit(1556724865.287:14696): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 742.790135] protocol 88fb is buggy, dev hsr_slave_0 [ 742.795373] protocol 88fb is buggy, dev hsr_slave_1 [ 742.820210] audit: type=1400 audit(1556724865.297:14697): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f0000001300)=[{&(0x7f0000000080)=""/84, 0x54}, {&(0x7f0000000200)=""/4096, 0xfffffee5}, {&(0x7f0000000100)=""/168, 0xa8}, {&(0x7f0000001200)=""/123, 0x7b}, {&(0x7f0000001280)=""/107, 0x6b}], 0x5, 0x700) [ 742.930183] audit: type=1400 audit(1556724865.317:14698): avc: denied { map } for pid=21754 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x10000000, 0x402) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', <r2=>0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000380)={@hci={0x1f, r2, 0x3}, {&(0x7f00000001c0)=""/123, 0x7b}, &(0x7f0000000240)}, 0xa0) syz_execute_func(&(0x7f0000000000)="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") syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 743.084798] audit: type=1400 audit(1556724865.337:14699): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.270178] protocol 88fb is buggy, dev hsr_slave_0 [ 743.275587] protocol 88fb is buggy, dev hsr_slave_1 15:34:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(r2, 0x0, &(0x7f0000000380), 0x80800) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000040)=0x1c) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x3, 0x0, 0x1ff, 0x1, 0x9}}) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 743.316021] audit: type=1400 audit(1556724865.337:14700): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r2, 0x3d, "f2e47c", "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"}}, 0x110) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) socket$bt_rfcomm(0x1f, 0x3, 0x3) 15:34:26 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000001c0)={0xfffffffffffffffa, 0x101, 0x4}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={<r3=>0x0, @in={{0x2, 0x4e20, @loopback}}, 0x7, 0xff, 0x3, 0xffffffff, 0x61977940}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x7}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) [ 743.582629] audit: type=1400 audit(1556724865.387:14701): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.729020] audit: type=1400 audit(1556724865.407:14702): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='mime_type\x00', 0xfffffffffffffffb) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8000, 0x400) r2 = gettid() fremovexattr(r1, &(0x7f0000000280)=@known='system.posix_acl_default\x00') write$cgroup_pid(r1, &(0x7f0000000180)=r2, 0x12) keyctl$clear(0x7, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1be, 0x700) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:clock_device_t:s0\x00', 0x24, 0x3) socket$pptp(0x18, 0x1, 0x2) 15:34:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") finit_module(r1, &(0x7f0000000000)='/dev/usbmon#\x00', 0x2) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000001c0)=0x3, 0x971ae9559893abbe) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 743.942277] audit: type=1400 audit(1556724865.457:14704): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, &(0x7f0000000040)=0x7, &(0x7f00000000c0)=0x1) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffc000/0x2000)=nil], 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x4, 0x4, 0x40, 0x0, r0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000140)={0xf, 0x102, 0x6, {0x5, 0x1, 0x3b3, 0x2}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000000c0)}, 0x10) 15:34:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x100, 0x801) getresuid(&(0x7f0000001600), &(0x7f0000001640), &(0x7f0000001680)=<r1=>0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @null, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x5, &(0x7f0000001580)=[{&(0x7f0000000480)="bfa45c0cdbc176c7b6d37b02111ccbac9b6f0b802a92565c44bacebd82faa72ef99552f9daa71ad3b73f326726f6573ef6952acf6b5bc07491556a84e6f2734818e5738d9a2ebd3eb5a8e1ffed991d678a7ca945734fdb14b0a7b6585a4f79239652a187ae5517a3f67ad24b80189fd3a80fa8b0851640effa2cae6f7bdcf98c0e7d45dcc9877aa8b6cad25e8c8a95535741c13952ab69a5d5c41d7617cf1e3b2d55252c0c43b58a6450783a42bff0dc5c68dda191c14633200152ca5ab8de6e26ed125c4280564435c6b71f56db77854ba7781698070340d14416122da6ad98a93273a445c893d8655f3be9959dc01f29b5b183402d8bdf41efe87b8ae93b1588ed48791b8e15faf8acedd29f89a471f14eda4e9e7d47f36b37a28c1034d2cc0105068d162d9d7f30e1308513bb0df9c51a074db379e192830e00fdecc0663858e3a7fd58ea51c4fba9aaffdf4951e53a5829b5e202591562f6aa35eb938b8d83bd7ad2f9ce9639b7a559bcc04a0dbf9cbfd8bb9df76c03c094bb912866f60c9226dd048b728e1040798f061d270a7b241436ece482ec0302e165a16a8be4504bd52752665b68d336a603e7b87d63150a0a306bb9b62fa146eaa28ea983a7a0af9f71833b3abd85b47f9cf6411e4b145b1569075bc99b1c081241b1d0b29c4af513d37a0dfa9abedd5d4baae690920a2912c0f821327d2433705ddd43469ea4627ab985abd9b6a2f42b427260dede808d5189b4e009410de3878040af7c9af58af81c93e06f00a51c57e97607a62e42196eba2981bcb4da141f220e15cc0c1203afb27ff59bcf0860f19f070ce714971592c5425c58a40c7fa22541bed42c118a9664057758ca10e9def8bb52b64026fd8e3ea565502adaf38563dbb668790755efb8b363b8cb2443f3fbe2877fa5eca2bcf5485f4ce61f65abfd75f89070226197a2d11ba1c0a1abe4e0523b88f26fcdf41b9ba24270187aedfe5d3731a1fa68ab92dec0d159251c193522a749574fb05750f6997b29b8b263ef18d33aaa5992a0f2338fd57151e7db71ce3b6606f38bb64c2625769f6f82fad4637a05ccc0604e3fcc3cd7bce274abaa9f9d3423fa0d3f1c4a47f20dd7a346f69d2b3e4c046e9faecb34364d76d49ba6d61b2701e59c020fb49ae3b0d1ea336a171cb53ed8758d1300f114941a395009b7abd6eb36c8b432f2ac817a10f8496d2af047fd9c845d0be0d172539cb86d75c5ca62461e5f64e50382be4c36488b6a08f02582412c041c54d303cf5bbc240a7697c4623e215d3d6c2d454a4e3343f0e8a2eeb8fed049ba4e33b010e2c910aaddbf4a76ab7a8b4d84d474b723985619cce5c716762d48c71569387c28bed4aabfa744f13dba416730d62dd51ab9d7aa5e899d55ea758d5bdc69278b6a3141690c40ddb6cf6dc98dd6b57bd874334c7cdb5a20b751c9b208b3828e49d61585e28ce1dd1bd6cb90baf9826b7903cc163a542344d5d29a7fc257840477c156403c37bb7653a71ad7a70994cf535689154c7789b771f6f9707d1caf34a18d2e36de50a8afbf68eb358634326f38c88a962d4cfe497b4eb18139decc63236e3c3abbce08cfc88aee0e11ecea127f372339ad24416458d0177bf8c5738364688d310272af1f679cb0e72d9d1187dde47ade322043a3d765eed3dc3307fc4daa40d34bfcd0b685cd91958b16a7d7bc8f85ee5169b2ec5b0042df90c4dd9f85a00290116b8225ee14046bed2c6593136fad21b06027214c472d73f4cae8a152180db5b932de2e8af8a76bd6bb285047f1152fb7629db10018670f9aa878761d8458139eb8644d8f8446e44dabf6f3a6c4c314e219be82d883825d6f7bcadc90951c0139e19d7a938629eb765cd3aebd292445580f7266cfe5480d0b36df06213a31fae488de8fabfdac4597a2924ea4248702995956746f1fb72a02c20cef51ac733535cb812144888ecdcc81d1d93ac6b433d8e60d55d436299dd94623378954d2ca10c94b434af5d2263092a923544e9cf7491e27eef7dc29c3e71eb2a6a216348396def62fda9f1921c689b4820d45f4aefd3c44cd530a2b9c765d89fa7375fcfab31bccf80abb6527e2138329d5cd2c6c99029105671a1820c0c02f35efcf94b7984725895f6da46adf220f32f0855cfe9d5b20962c5a4161ba096b39321101c00d77ac135c7aa3b4946f1d2f9ab5da72df837f7ac3bccc0df9b7e3721b65986ed38a5eb0c092c4e98e45a99ff74a6cc75fc27ff365091385c8df845e18ee6b8e5298ed28363daed5e3c1b2b87b5487aed63ea995e074b0b5f91931dc25baa9698f7a36714b3baf7123852d85f21ec3ae89580f56f3df0851255186489b9007f16b945c60fcee0ed0a76e16778e12691f429981bd3a43664f42e0c74bb082857b48f1cee656e212aff7198eea6e2cac62d09428717d8c2053ff92ecd7f04a80af7c060c0c5741183c89606f093197afaa1ef58025c821375ded5596e79263ff2ede4821f8a1170145bed2480d1a69aec7d7dcebfcee4e41809ee61f5ddd3058a7fb6d12a664bdf0cd7861e128c8b7ff532abf6308139e5a3478720ea2d09c45ecde62a86d8fc728ba3a5e4bf7e2c88748cffbacaaf7ed05b9b477e7fbb805ff26f93ef109eb0c75ea40f130cc502e1e23f0f04aed419d4d487e5c38d03cd46825663b8b38192658fe61f00cd7a0e9cf8c834efd0ff4ce981fedee62be1a0e1ffc8f27d3a3dc1cca7eadf8ff4372c0d65f01ddfa2c4545fb1907867537b2bf0d4ea820282cbae789fdf2d52f6b6f38851ed49e663e050d0d14720408e097e262e22d51b56cfa0b5aecd4d16c269ea57d59968a5be04281dff283ad98f95d0461bf736a38cb1a9b4767ef9779eb362f5a484d063719d5cbdae8647079ea234fed44a5ce0bc59c076f070a52692ca3d2df56e43f3b65b18f5a662a015c549ec5b1b36ef6b76ec379c63d48fc9be36ffc08dfef6f671088a7e8e97b6a943ac77680208ff4840c189c58e4dcc3a9d88114039d811ad41d632c6e2ff4ab2a63dd51ef2b9a9d03a668e451e2b89c8cd285174647a9e5b64ef5e63452b54463283d3957a317e1febda1b9b72765968d590887d57fbf0f1b38adf0a2925e31571832de4e29f8ee06306af31bdfdbb93ef18c396de48c51b609a16a9d821723b1542619a215990b0fb279b57f309aa089fafe5b90ec3b3da7a94b025c7f3d5a1907b7a597e8edf3ea58cf515186619924260cc723a458f427730e81eb8a48b7e2296ebbaaa33a1bec8efce77bd202f25be817d0b1bdd9cd3f8952bc5b6f9af62a597623815b5cf04c92a7cacce4c79a0a8eeb4d6fd0a9ef1b808ffad6b492dee32e466e2ae7281067092789eca7bbc377aea3753d57fc7af1725a591df6cbfb218709dabcff0b93c038db53fae690d5d4f31adca419eafda51745c219ca54c63e5c6ecb0425a9525345161ea06eb1003c45f0c482269ec38cf6aaa7736c9e4d92455e08adcfbdb018064522dbe2848efda74750013f1942dc47ceb83c993c138a7bc5f45fd41f188ad030fa68fe7224fb523df5a62563961a048012d56c1efc5ea3091e5720130ee184c616810a783d9e8cc78e0598c6e820309dca6b590dd7d1d6e61a15ccc58120e25a977ede5f77235262f3da7e41a15af29c09fcedd60ad3f3ca79b2df0f8f393a94aca92f40061dc8fff47d18e5b7d18f1386bc4f91609367924d0de23ae2ba361cd762c64b0cca1a5da1b778ed5f2a3dd50172511735ae9bfd91b9e32507408d7ac96127483428c459e830a03e46f972c736ba24e8ed2a72b9cc90130fa26b69900cff61c6f0aaae5877aaf3941162dbecff071bd9453b03bc70e4111a22d0a492038c4f2f4825135962a52fe992ce7c33b351cf8eaef2dbf8367c9bdd1ce9442c1f9af435c8e50f930c3c08b9d6677fb6644c1e43d54c398c9598be076253bcbd38393a03ac56672bdf9e17302e478e7468a9df3ccf56d06b16b7fe87cd198a23b8aa46134bc85e0f54fea21d7b8ac24cf71a960211cb496b0409738a5153d3a81b3a968d5f05d24e5b65ee1cb738853df12ce78a5a0dd56e96dd6a0cd00fa0e0650c1ee8b587a02fb6f165d66255c9b70762aa7d2e3538d50745f193daed262450d37444731dc66baf4f93b06590934ad539fb1e728e9ee8db448c918bd9a03c931a82bef37b15c0289d39032b23fb6367c09240aa1ef11d835fd204fc1b8965d9a6c3df50f4de78fac8e08c0c952afdaff9584b50d02eed1661b1c3aacba9d02d9ae2a562a10cb89d50669982342e0746e9eebb742454db9731e65b0d1b7d9d57d3fd1f7f1b3cfd0ebb36829358fe6331a4d88795f2b46fd8af5cc748358cb04f4a2d6e3a779d216c56d0406315e7436052e6599dc78e536f281ebaa74bbabcb5f58dbafd63093e122a6c0aa455d4e57d885993ec030ff1a57c79fcfe3bfe9bbefca42429e7d563732ea3522c00ac6a4bbf19f6ba8c6eba4482b6e6f744af6036e5c122a080982cb0868793edcd892f213ea97f1766e83f1e8e5e22eaa0253ff30579013c3b8e9365f42a43621aed26f9e3abe2525a0d63cd0bd81bbd623fd2c62d0c9e0ac47b92d4fc4c322e39f08bd72abdf88eebf27032deeee8cd9910f45ed7428d731529171db6a0f7bc1c92df8b5282cfcfd55bd948b15f0904ecc43a07a7b0df65227dcc868ac6f7bee8087ca473ac435a82d8ade220d6595237eb01ef80d420aca94c17150798ee95c4693f021fd9db60156fd39d0833ec29a74106dd5588af3fad5a9a8f78e2f42127021e09d438630637ef9ed6d031ce5e60130d1fb78c05e9542eee8fbdaca8438cb067449d38747afa52eb1a71b6706bb724651592d265be189cc2b8e6a03270ba91a67bcce8d3edeaec9c352410d8e6c175a56ab8cc0985e9b444a50cab165a70dd176cdb90d30f11a92470cf00fa5302fb533317cc616af289c45433e23a718619473471ab3bd4429a83d8c690271f545e415f4c6e31155457a1bfc58e547960e3e62d5af5b51b12fd055baa472bd15c5826f90d10754be596837782b48b2cff4f2bfb99e85afd563f012b588ec313484ee1226853fd3739fbd376c3ade2ef7c359afb47cb25f0db966278c6cb43b93f9597dae5c53b7d6dcd0d2304a1b62158af88f0cc10fcd39488f1cc76d3ef109fc459f207f3b87f4334fe5a0d52c5275cc444b2f73e21f89ec4079eec84f5ded03d00b1710c72eb181bbf41eab2198553fa85b8fceb702d4d6b0bebd7a1477d2a77479c0986e637f728ffc6a12eb52ebba7f22dc34bb80d94da5ac01e09a952590b9b131100b9bbe4741d5313222dfb006d47124d0d86edd8acce470b19da7f20e7502df6934cbc6d6e4a0a5f597df4a984807f09cb8697fe9476301ee879f49ea0d7eca75c31f1a9a562fa85eeaa46be83510aa5f063d05948638f4f9e71ed6cd216590838f21e79e914fd788bbdfd03d3250ce060e1e929a92eb164ab7a7c007194723ed43f3b1af2b41918be875f4c1e20e95cb49511d84715be830ea6a2e593b630a0ab751f51610e7c936e92d8181b69cc9e4a4d3b57f1161e3067a5fc125eb4c58718ebca44b5d90f36db1aba470f3f1f8a4d6c875becb9c775d7dcc1c759d8da40ab2b1d87e8fb83cdccc36f7f49801bd56c8d1d2795ffcff8708c1642c9c6aab9c9350d3b836a176dc74d3602c050394b857bb30dd08f8f09848ee51f6582d9e5b3cc9f899a65b5e73d8a9410c7631c15ca8036a809a46e1b38403f694eef384b1250704c423983dc3442ead1b60db3", 0x1000, 0x7}, {&(0x7f0000000200)="32fa8041ac4112b769d6065a555a1d9d96728a0ff8", 0x15, 0xff}, {&(0x7f0000000240)="fdc1da8da0ab125c4532727a12763640cb68f43fb825db5fe69fee67f4f05138204d5e614490e4b873182dfad2007aa75cbe98720f3ba5f1118e5018faa9cc5f528d670b5681da27f93ed2209b8286362a67dacb13562232ad5afb91ad08c661a62ea0da7a95594fdfe924e4c6cbda546810bd682bf934704f4aa4eb3d7fbfa679b47157bddc6234d93b880e8decd05125f00d22bd97e9da877bbee9dbc1d3d14321569c62a51d730272c246bd7193cfcc127a41230ae1dfa4", 0xb9, 0x9}, {&(0x7f0000000300)="94853d562fbbb50b58646c", 0xb, 0x9}, {&(0x7f0000001480)="459dd067fce65c7cb284041fe54ba703588d86869cf56dc91eb3363650b7b8222855287b4119882405775cf433022964a9b04c0a30e057e0fe1a50ff7aa4030820340b945496dcc43b3e00a974cab7fc87dcb9adc47c37d2464a99e59af69b1ad34c0b8a4e670a7dbd1e5da359c30bec0e36e4fda778086b96880b1922b5735006f2c85485ad4d051f320184ac2f65dbcc85468f5693c61f99d0d0e823b816c0475f62dae1786fc946d97ad8a4216a2794cc0ecddfc72680ea50615dd120b4f648e0e996f47e9ea6dad35bc843c16843", 0xd0}], 0x2080, &(0x7f00000016c0)=ANY=[@ANYBLOB='errors=remount-ro,smackfsroot=\\}trustedem1+,fowner=', @ANYRESDEC=r1, @ANYBLOB="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"]) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f31ea4fc1") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f00000018c0)=""/111, &(0x7f0000000100)=0x6f) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) write$P9_RXATTRWALK(r3, &(0x7f0000001880)={0xf, 0x1f, 0x2, 0x401}, 0xf) syz_open_dev$dri(&(0x7f0000001940)='/dev/dri/card#\x00', 0x140000000000, 0x200000) [ 744.105843] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. [ 744.159958] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 15:34:27 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000001c0)={0xfffffffffffffffa, 0x101, 0x4}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={<r3=>0x0, @in={{0x2, 0x4e20, @loopback}}, 0x7, 0xff, 0x3, 0xffffffff, 0x61977940}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x7}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) 15:34:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:27 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008913, &(0x7f0000000300)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000000)={<r2=>0x0, 0x200, 0xfff, 0x100000001, 0x0, 0x8, 0x4, 0x5, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x401, 0x5, 0xfff, 0x9478, 0xfffffffffffffe00}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x5}, 0x8) 15:34:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101400, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x7}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x3, 0xfff, 0x3, 0x5}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/239, 0xef}, {&(0x7f00000002c0)=""/85, 0x55}, {&(0x7f0000000480)=""/195, 0xc3}, {&(0x7f0000000580)=""/245, 0xf5}], 0x6, 0x700) [ 744.958609] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. [ 745.010307] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 15:34:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, &(0x7f0000000040)=0x7, &(0x7f00000000c0)=0x1) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffc000/0x2000)=nil], 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x4, 0x4, 0x40, 0x0, r0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000140)={0xf, 0x102, 0x6, {0x5, 0x1, 0x3b3, 0x2}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000000c0)}, 0x10) 15:34:28 executing program 2: readlink(&(0x7f0000000580)='./file0\x00', &(0x7f0000000600)=""/228, 0xe4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mkdir(0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', 0x0, 0x48000000, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/50, 0x32}, {&(0x7f0000000180)=""/142, 0x8e}, {&(0x7f0000000440)=""/208, 0xd0}, {&(0x7f0000000340)=""/139, 0x8b}], 0x4, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000300)='./file0\x00', 0x100) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580), 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) 15:34:28 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "fb5e98742cffd2bfe5a9214b2ef2d496"}, 0x11, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000006c0)="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") ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000180)={0x0, 0x1, {0x16, 0x1e, 0x10, 0xe, 0xa, 0x0, 0x0, 0x3e, 0x1}}) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000000)={0x3, 0x3, @start={0xffffffffffffff5a, 0x1}}) 15:34:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xfffffffffffffeb0, 0x0, 0x1be}}], 0x1, 0x0, 0x0) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x5, &(0x7f0000ffc000/0x4000)=nil, 0x3) pipe2(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={<r3=>0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x80000000}, 0x8) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000280)={0xfffffffffffffffd, "995d071254a4357ba2f0ec735caf17f0ca12e550548e0ff4c070315b1f389915", 0x1, 0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=<r4=>0x0) r5 = syz_open_procfs(r4, &(0x7f00000005c0)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:28 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x955932b0819e30d3, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x3, 0x20040) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000200)=@sco, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/7}, {&(0x7f0000000280)=""/86}, {&(0x7f0000000300)=""/91}, {&(0x7f0000000380)=""/251}, {&(0x7f0000000480)=""/119}], 0x0, &(0x7f0000000580)=""/202}, 0xb9}, {{&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000700)=""/130}, {&(0x7f00000007c0)=""/4096}], 0x0, &(0x7f0000001800)=""/107}, 0x5}, {{&(0x7f0000001880)=@nfc, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001900)=""/39}, {&(0x7f0000001940)=""/228}, {&(0x7f0000001a40)=""/228}, {&(0x7f0000001b40)=""/245}, {&(0x7f0000001c40)=""/120}, {&(0x7f0000001cc0)=""/63}, {&(0x7f0000001d00)=""/117}, {&(0x7f0000001d80)=""/139}]}, 0x7}, {{&(0x7f0000001ec0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast1}}, 0x0, &(0x7f0000002280)=[{&(0x7f0000002fc0)=""/12}, {&(0x7f0000001f80)=""/112}, {&(0x7f0000002000)=""/75}, {&(0x7f0000002080)=""/241}, {&(0x7f0000002180)=""/251}], 0x0, &(0x7f0000002300)=""/120}, 0x820}, {{&(0x7f0000002380)=@alg, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002400)=""/23}, {&(0x7f0000002440)=""/71}, {&(0x7f0000003180)=""/4096}, {&(0x7f00000024c0)=""/11}, {&(0x7f0000004180)=""/4096}, {&(0x7f0000002f80)=""/48}, {&(0x7f0000002540)=""/92}], 0x0, &(0x7f0000002640)=""/252}, 0x10000}, {{&(0x7f0000002740)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x0, &(0x7f0000002a40)=[{&(0x7f00000027c0)=""/24}, {&(0x7f0000002800)=""/245}, {&(0x7f0000002900)=""/252}, {&(0x7f0000002a00)=""/62}], 0x0, &(0x7f0000002a80)=""/195, 0xfffffd72}, 0x144}, {{0x0, 0x0, &(0x7f0000002b80), 0x0, &(0x7f0000002bc0)=""/55}, 0x8}, {{&(0x7f0000002c00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002c80)=""/76}], 0x0, &(0x7f0000002d40)=""/12}}], 0x40000000000034e, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') write$FUSE_POLL(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x3, {0x8}}, 0x18) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000040)=0x8) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x400, &(0x7f0000000600)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@uid_gt={'uid>', r7}}, {@obj_user={'obj_user', 0x3d, 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}]}}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r8 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000002c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.sched_relax_domain_level\x000zgWd\xb8\xb9w\xa1\xa9\x04\x05@\x9f\xd2f\\7\xb8\xf38\xc8\x8c\xba\xed\x17\xb2\xb6\x9a\x1dmy\x00\x00\x00\x00\x00\x00\x00\xa7\xe9\xf1\x9bk!\xb8\xfc\\\f\xa6\xbb\b-c\x82\xb9\xfd\xb0\xe6u&\x13W\xc9E)6G)@\x872)\x80\vos\x86\x1d\x92c\xa41\xc4\xc8L\x84\x05\x00\x00\x00\x00\x00\x00\x00;Y9\x000$Q\x82\xfb\xc7+Y\b\xf9x{\xa7f\xbf%f\x1f?|\xd0\xa4r\x89\xb2\xf5p&\xfd2\x89@\xad\b\x01\xe4}\x8d\xf3\a#\x13J\xc6\xe7\x03]\x1c\x9fp\xcfKJ\x1e\xc5w\x19\xaa\xe1|\x80\x91\x83q\x17\x06}\t\xdb\xbd\xe4\xfa\r\xd8\xa4`\xc8\xfc\xfe\x8d\xa0\xfeC\xc0\x1fG\xb0\xb98\xef\x0f\xbcHB6\xcc\xd8(\x00', 0x2, 0x0) sendfile(r1, r2, 0x0, 0x20) 15:34:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x1, 0x10000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x0) recvfrom$ax25(r1, &(0x7f0000000080)=""/97, 0x61, 0x2040, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:29 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x80, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 746.950149] net_ratelimit: 20 callbacks suppressed [ 746.950155] protocol 88fb is buggy, dev hsr_slave_0 [ 746.960376] protocol 88fb is buggy, dev hsr_slave_1 15:34:29 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x148000, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e22,version=9p2000.L,cachetag=.wlan1ppp0proc+,cache=none,subj_role=($,defcontext=unconfined_u,measure,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c646f6e745f61707072616973652c61707072616973652c00ee66f9563b2bb2eb569d64fda707e485efb29e6f14c60d4bcf1ce0455cfd"]) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000006c0)={0x2, 0xa71, &(0x7f0000000540)="1ca6b175e11c362e22d1e2c83965893151d13bb4d42c118bc336ee49c9ab0615f8d5b84b6cdbc331b1c5198101e3c5f67b0621ed367880a02724c36b4bddf8ddee644f6ce3bd5943b7bef1ab51fce5833ef4c9e32087df20a296e9e9cf5581b54c69bb86b848af12df75da8158ef5d4c477a25", &(0x7f00000005c0)="61e474a75c520ca17bfdf47f2647a23b600ee5c366978588a4dc1f20e036aa3503e9fbc19df78a787d78f3de47aff38b1acb21b3f024ae72b53ccfe949c43a50cf399c23ef61bde015ecbfa2eff692f94b9c5e9be98f7c88e2b696f55ca4d872028bc3fd78b73948d2a5eb2cdaa1a95749e802e598484c6dbdbad74daf804fa379026b58bd603e7f5471d8f40359b984642d9a86a687aded26b5844e884a4aba2324e2fcdf88d1d0a14bc307fee9410468893dc68e2ffa90bdd8580d2f228b706c98f17359bf8d06c4", 0x73, 0xc9}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000004c0)={0x3, 0x1, 0x66ba7018, 0x25cf, &(0x7f0000000480)=[{}]}) syz_execute_func(&(0x7f0000000000)="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") ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000003c0)={0x8, 0x2, {0x3, 0x2, 0x9, 0x54079b7ca18b55dc, 0x1}}) 15:34:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x101200, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', <r3=>0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="b40200001400260326bd7000fedbdf25fe8000000000000000000000000000aaff0100000000000000000000000000014e2100004e21a53f0200a0a07f000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x2b4}, 0x1, 0x0, 0x0, 0x1}, 0x4) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x6f, &(0x7f0000000140)=""/172, &(0x7f0000000040)=0xac) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x2, 0xa798, 0x100, <r3=>0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={r3, 0x7f}, &(0x7f0000000200)=0x8) close(r2) close(r1) 15:34:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:30 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x40, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x101) ioctl(r0, 0xfffffffffffffff9, &(0x7f00000000c0)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 747.440558] protocol 88fb is buggy, dev hsr_slave_0 [ 747.446306] protocol 88fb is buggy, dev hsr_slave_1 [ 747.452372] kauditd_printk_skb: 208 callbacks suppressed [ 747.452381] audit: type=1400 audit(1556724870.367:14912): avc: denied { map } for pid=21883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:30 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0xffffffffffffffbc, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='lapb0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000000c0)={0x2, 0x26, 0x6}) r5 = dup2(r1, r4) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x2) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x2c0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 747.662234] audit: type=1400 audit(1556724870.367:14913): avc: denied { map } for pid=21883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 747.684721] protocol 88fb is buggy, dev hsr_slave_0 [ 747.684783] protocol 88fb is buggy, dev hsr_slave_1 15:34:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800200003804000019000300e60100006c000000000000000100000001000000000100000040000080000000000000006d5ebe5a0000ffff53ef", 0xffffff96, 0x400}], 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x212) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000001c0)={{0x96, 0x4}, 'port0\x00', 0x25, 0x80051, 0x1, 0x6, 0x9, 0x7f, 0x30, 0x0, 0x6, 0x367}) 15:34:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000180)=0x8000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=<r2=>0x0) capset(&(0x7f0000000200)={0x20071026, r2}, &(0x7f0000000240)={0xa3, 0x401, 0x8, 0x4, 0x5, 0xfff}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SIOCNRDECOBS(r0, 0x89e2) syz_execute_func(&(0x7f0000000000)="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") 15:34:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f00000000c0)="ba16ba02bf27f330871b7e546fe59c24d800000003224544d16af217b1b438edc372766f8abd706ff01860392f29047770990602911b1a9e42f60ce58ddca1000000000000000000") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 747.878635] audit: type=1400 audit(1556724870.407:14914): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 747.910145] protocol 88fb is buggy, dev hsr_slave_0 [ 747.915311] protocol 88fb is buggy, dev hsr_slave_1 15:34:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 748.070151] protocol 88fb is buggy, dev hsr_slave_0 [ 748.075308] protocol 88fb is buggy, dev hsr_slave_1 [ 748.092093] Unknown ioctl 19301 [ 748.100996] audit: type=1400 audit(1556724870.407:14915): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.219544] Unknown ioctl 19301 [ 748.265707] audit: type=1400 audit(1556724870.407:14916): avc: denied { map } for pid=21883 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:31 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) semget(0x3, 0x0, 0x89) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={<r2=>0x0}, &(0x7f00000000c0)=0xc) wait4(r2, &(0x7f0000000100), 0x0, &(0x7f0000000200)) [ 748.453714] audit: type=1400 audit(1556724870.457:14917): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:31 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='team0\x00', 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 748.646559] audit: type=1400 audit(1556724870.467:14918): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:31 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1e93}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcad}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000002c0)={@mcast2, r3}, 0x14) [ 748.805422] audit: type=1400 audit(1556724870.507:14919): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.926845] audit: type=1400 audit(1556724870.517:14920): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:32 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x40000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x30d) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000100)={0x0, 0x1, [0x3, 0x0, 0x1f, 0x2, 0x8, 0x10001, 0x1, 0xe359]}) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) setsockopt(r0, 0x10000800000010d, 0x2, &(0x7f0000000ff8)="fffffff40100ffff", 0x8) [ 749.075618] audit: audit_backlog=65 > audit_backlog_limit=64 15:34:32 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x81, 0x101000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x3, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x4}, 'port1\x00', 0x4, 0x0, 0x1, 0xffff, 0x6, 0x7, 0xe0, 0x0, 0x3, 0x3}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 15:34:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = eventfd2(0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000006c0), 0xfffffea1) dup3(r2, r1, 0x0) r3 = gettid() tkill(r3, 0x19) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 15:34:32 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x204, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, [""]}, 0x24}}, 0x48000) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f00000001c0)=0x3) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x4000000020000, 0x101083) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RCLUNK(r0, &(0x7f00000001c0)={0x7, 0x79, 0x2}, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000180)=0x1) syz_execute_func(&(0x7f0000000000)="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") r2 = socket$kcm(0x29, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000240)={<r3=>0x0, <r4=>0x0}) ppoll(&(0x7f0000000200)=[{r1, 0x110}, {r0, 0xa100}, {r0, 0x22}, {r1, 0x8104}, {r0, 0x100}, {r0, 0x2000}, {r0, 0x400}, {r2, 0x8020}], 0x8, &(0x7f0000000280)={r3, r4+10000000}, &(0x7f00000002c0)={0xff}, 0x8) 15:34:32 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x181400, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0xaa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000540)={0x9e0000, 0x2, 0x5, [], &(0x7f0000000600)={0x990b6e, 0x2eae, [], @value64=0x2}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="000000400e000000000000") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x54, 0x5, 0x8, {0xfffffffffffffff9}}, 0x3) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={<r3=>0x0}, &(0x7f00000000c0)=0xc) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000480)={0x6, 0x6}) prctl$PR_GET_SECUREBITS(0x1b) fsetxattr$security_smack_entry(r1, &(0x7f00000002c0)='security.SMACK64MMAP\x00', &(0x7f0000000300)='\x00', 0x1, 0x1) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000180)='\x00', 0x1) ptrace$peekuser(0x3, r3, 0x400000000005) write$FUSE_LK(r0, &(0x7f0000000500)={0x28, 0x0, 0x1, {{0xdfe0, 0x8, 0x2, r3}}}, 0x28) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000004c0)={r0, 0x0, 0x0, 0x20, 0x432128cc}) 15:34:32 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=<r0=>0x0) wait4(r0, 0x0, 0xe, 0x0) r1 = gettid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) setuid(0xee01) tkill(r1, 0x1000000000012) 15:34:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000001c0)="64d848000f019f4182d22b430f00dc6566400f38807bf266ba400066edb9800000c00f3235004000000f300f23ff66baf80cb8b503f382ef66bafc0cec66b867008ec066b8aa008ed0", 0x49}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e22, @broadcast}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:34:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:33 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000001, 0x801) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f00000000c0)=0x2, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x100000000, 0x8fc8}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 15:34:33 executing program 3: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x8000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={<r5=>0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000480)={{0x7, 0x6, 0x1ff, 0x725877aa, '\x00', 0x9b1e}, 0x0, 0x7, 0x54, r5, 0xa, 0xa762, 'syz1\x00', &(0x7f0000000100)=['\x00', '/proc/thread-self/attr/current\x00', 'trusted\xbewlan1\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', '/wlan1,$\x00', '\x00', 'em0-vboxnet0-,!4ppp0!md5sum]\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', '/proc/thread-self/attr/current\x00'], 0xa4, [], [0x7, 0xfffffffffffffffd, 0x3, 0xc]}) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/226, 0xe2}, {&(0x7f0000000200)=""/172, 0xac}, {&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f0000000680)=""/169, 0xa9}, {&(0x7f0000000480)=""/216, 0xd8}, {&(0x7f00000003c0)=""/101, 0x65}], 0x6, 0x700) 15:34:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:33 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, 0x0) shmget(0x3, 0x2000, 0x78000000, &(0x7f000007a000/0x2000)=nil) 15:34:34 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000000c0)={0x1, {{0xa, 0x4e23, 0x400, @dev={0xfe, 0x80, [], 0x11}, 0x7d6}}}, 0x88) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:34 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = dup(r0) bind$vsock_dgram(r1, &(0x7f0000000140)={0x28, 0x0, 0xfffffffffffffffd, @host}, 0x3c0) 15:34:34 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xfffffffeffffffff}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x80) ioctl$KDENABIO(r1, 0x4b36) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') creat(&(0x7f0000000140)='./file0\x00', 0x10) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:34:34 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0x100000001}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f00000000c0)) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000100)={0x1, 0x3}, 0x2) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:34 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x0, 0x3}}, 0x8) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000200)={@dev, @multicast1, @remote}, &(0x7f0000000240)=0xc) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r2, &(0x7f0000000040), 0x8) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "799d8d65c63caaf6916f146f86bbffbf"}, 0x11, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1e21) listen(r2, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x88000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000100)={<r4=>0x0, 0x10000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x4, 0x0, 0x5, r4}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0xff, @multicast1, 0x4e20, 0x1, 'dh\x00', 0x5, 0x8000000007f}, 0x2c) 15:34:34 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000300)=0x5) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={<r2=>0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @empty, 0x1ff}, {0xa, 0x4e21, 0x8, @local, 0x200}, r2, 0x3}}, 0x48) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x20b) ioctl(r3, 0x8ce1, &(0x7f0000000180)="0adc1f123c123f319bd070") getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") write$selinux_user(r1, &(0x7f0000000240)={'system_u:object_r:hwdata_t:s0', 0x20, 'sysadm_u\x00'}, 0x27) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'bcsh0\x00', 0x200}) [ 752.080667] net_ratelimit: 20 callbacks suppressed [ 752.080714] protocol 88fb is buggy, dev hsr_slave_0 [ 752.091568] protocol 88fb is buggy, dev hsr_slave_1 15:34:35 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x200000004, 0xfffffffffffffff9, 0x8000000000006}) 15:34:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x9) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x0, 0x20343059, 0x3, @stepwise={0x4, 0x7, 0xd6d, 0x7, 0x100000000, 0x80000001}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000005c0)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000001c0)={[{0x8}]}) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000000)) [ 752.230131] protocol 88fb is buggy, dev hsr_slave_0 [ 752.235424] protocol 88fb is buggy, dev hsr_slave_1 [ 752.310435] protocol 88fb is buggy, dev hsr_slave_0 [ 752.315639] protocol 88fb is buggy, dev hsr_slave_1 15:34:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000000080)={<r2=>0x0, <r3=>0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000480)={{0x0, 0x5, 0x7ff, 0x5, '\x00', 0x200}, 0x0, [0x100, 0x3, 0x9, 0x7, 0x4, 0x80000000, 0x3, 0x0, 0x800, 0x2, 0x5, 0x530, 0x8001, 0x7, 0x0, 0x80000001, 0x3, 0x0, 0x1, 0x8f, 0x52f1, 0x1, 0x8, 0x10000, 0x2, 0x8, 0x0, 0xd90d, 0xfffffffffffffff8, 0xffff, 0x1, 0x1, 0x1e, 0x1, 0x7fffffff, 0x3, 0x9, 0x0, 0x1ff, 0x0, 0x7fff, 0xfffffffffffff801, 0x800, 0x0, 0x1, 0x7, 0x2, 0x7, 0x2, 0x1, 0x3, 0x9, 0x9, 0x6, 0x8, 0x800, 0x0, 0x80000001, 0x5, 0x2, 0x72c, 0x6, 0x48, 0x3, 0x6, 0x10001, 0x4, 0x8, 0x4, 0x4, 0x4, 0x9, 0x1, 0x1, 0x2, 0x401, 0x8, 0x2, 0x7, 0x3ff, 0x0, 0x20, 0x7fffffff, 0x5, 0x3, 0x5, 0x1, 0x4, 0x9, 0xcd68, 0x2, 0x4, 0x7, 0x3, 0x5, 0x0, 0x444e, 0xfffffffffffffffd, 0x200, 0xfffffffffffffffd, 0xa5, 0xff, 0x7ff, 0x7, 0x2, 0x7fffffff, 0x10001, 0xcb, 0x8, 0x6, 0x91, 0x0, 0x9, 0xe46b, 0x6a, 0x7, 0x2472, 0x8, 0x100000001, 0x255, 0xed, 0x10001, 0x59, 0x8, 0x7a, 0x1, 0x1, 0x1ff], {r2, r3+10000000}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/8, 0x8}, {&(0x7f0000000100)=""/23, 0x17}], 0x2, 0x4a) preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) 15:34:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x1d83fa1) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001980)={0x5, 0x0, [{0xd001, 0x1000, &(0x7f0000000780)=""/4096}, {0x0, 0xef, &(0x7f0000000100)=""/239}, {0x4, 0xa5, &(0x7f00000003c0)=""/165}, {0x100006, 0xac, &(0x7f0000000480)=""/172}, {0x0, 0x0, 0x0}]}) 15:34:35 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x7f, 0x800) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=<r1=>0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000001c0)=r1) pipe(&(0x7f0000000240)={<r2=>0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000280)={0x78, "3a6a9a84d4c12134bb812e21b591ff33335e818394630ff2a8577d315ae6244380f10be084ba70a61416b6d5e1e102a6224cdd31d4ce77c0c658e111ee1ed55b33ef4e5883558bc26052ce25e00202f36b0a345b8d59036f0c228e268fe0193d40874993b562879fc6b0c5460bc5951dea57127afe2895369bc4ae3cdd58ab5a"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 752.512308] kauditd_printk_skb: 230 callbacks suppressed [ 752.512317] audit: type=1400 audit(1556724875.437:15149): avc: denied { map } for pid=22010 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000340)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3]}, @mcast2}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 752.772660] audit: type=1400 audit(1556724875.437:15150): avc: denied { map } for pid=22001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.912834] audit: type=1400 audit(1556724875.437:15151): avc: denied { map } for pid=22001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xd) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="9aef294015f48e317f69e7110e83fa27dbd4578410434c7efd3a357c9a7ef219f858be9001f6f8ba040961abdddbb8689509197da76c6299dca2759494c965290af2743b8e311ac817611c543d9717fc1edbde3c143c3f76203fd4d21f3a89627305a466623035f3e6254bd8246aa9098f8b8e548e17a632c2c8123dba956af215ab50fbdf04675e9b4ed3b25ae8769bf2982bb9b2daf942d8eb005957a2658e61aeaeac5e6e17e2095fbc323e1fc4a2a5964602694cbcde4a89ef6b85454af43abb990074c67baaabd3d051ce427c299291ef4e31e1fb9957d90e3cd83d") ioctl$TCSETS(r1, 0x5412, &(0x7f0000000140)) ioctl$FIONREAD(r1, 0x5437, 0x0) [ 753.127253] audit: type=1400 audit(1556724875.467:15152): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.190125] protocol 88fb is buggy, dev hsr_slave_0 [ 753.195382] protocol 88fb is buggy, dev hsr_slave_1 15:34:36 executing program 3: accept4(0xffffffffffffff9c, &(0x7f0000000180)=@generic, &(0x7f0000000200)=0x80, 0x800) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000240)=0xf1e, 0x4) 15:34:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c163f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x1d83fa1) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001980)={0x5, 0x0, [{0xd001, 0x1000, &(0x7f0000000780)=""/4096}, {0x0, 0xef, &(0x7f0000000100)=""/239}, {0x4, 0xa5, &(0x7f00000003c0)=""/165}, {0x100006, 0xac, &(0x7f0000000480)=""/172}, {0x0, 0x0, 0x0}]}) [ 753.340778] audit: type=1400 audit(1556724875.477:15153): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 753.530094] audit: type=1400 audit(1556724875.527:15154): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000040)=0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f00000000c0)={0xffffffffffffff00, {{0x2, 0x4e22, @remote}}}, 0x88) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:36 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x200000004, 0xfffffffffffffff9, 0x8000000000006}) [ 753.670214] protocol 88fb is buggy, dev hsr_slave_0 [ 753.675376] protocol 88fb is buggy, dev hsr_slave_1 [ 753.676308] audit: type=1400 audit(1556724875.527:15155): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.854521] audit: type=1400 audit(1556724875.587:15156): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:36 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000004900)='/dev/null\x00', 0x181800, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000004940)={{0xa, 0x4e20, 0x3, @mcast1, 0x4}, {0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x6, [0x3a, 0x10000, 0x6, 0x7, 0x1, 0x8, 0x2, 0x5]}, 0x5c) syz_mount_image$nfs(&(0x7f00000002c0)='nfs\x00', &(0x7f0000000300)='./file0\x00', 0x1, 0xa, &(0x7f00000008c0)=[{&(0x7f0000000480)="e4", 0x1, 0x80000000}, {&(0x7f00000004c0)="8d46b83aad58e91fcb1173b7f0aa8a2f20d2124aa186adc28c84252a56e53c1ef69af69d46a7d7b4d78f51ccd9e4cd814fb0e5186ddf3b50573663b79074a86e69ef9fca3da2c6a3bc47526b0a3d30c319809190447c3a7de96ac10cbdc568a09e7e7399e5420c3b721f5c9ac660fe098f2c8f0132091afec4d6d55aa755fc59bc35", 0x82, 0xfff}, {&(0x7f0000000580)="61220423213a3c8cc4a0b478f76bc24be41aa4eca993957d067f8c7570b7fb5608b5668db3a3898c1ec9c8178b00069b5906d75b830dc95b40961c75794dc1c9c49cec22ca", 0x45, 0x5}, {&(0x7f0000000600)="c2fe6c1c88c26d80170ee65fdea33e893791710b830fa5e8b460b8f564e322d080136f3e472800efacf45cb2a8895fd65ee952c744ba9929c173abad3d8c1340", 0x40, 0xffffffffffffff81}, {&(0x7f0000000640), 0x0, 0x6}, {&(0x7f0000000680)="4ffee3a220c1ca7b0770d942ffb8e63fe8bf4358cee352a2415661ac07deaf438ea3af14e7f47e14e3c5d0d7ae9ccde0fe1ff483d51fb4bb0d914415878a7055ecc73645ec0b13740c637660ab3503fde8d3fc3a11ed38597663361a7991d3b78645c3207f50bcc631e707", 0x6b, 0x5}, {&(0x7f0000000700)="69b2025648b8dae15512cfe350191d58bdd6af", 0x13, 0x72}, {&(0x7f0000000740)="96de894bec116149adf74fdc0d4c566a8f27323e0c49a894fd5a7f7fedbda1faaa8d6864f733d4bb19ca3769f1ba30a66b4423b7b025bccd84e073f16e5e6132d3b9264fdea6ffa2f2da735f44fb295a50da391f56f9776bc538111c0bb7637f0d0b0dd603a7", 0x66, 0x1}, {&(0x7f00000007c0)="53737cb87632793d08465c16abc14f747fb45fe6656f1b15eaea3cdd2cf87a4c", 0x20, 0x10000}, {&(0x7f0000000800)="3c4520ec6ae0ed30aeebcaf67ed4f001ea08770c5b9b007e3098bb99f172d6e52d5f4fd58e20dce59c344cfcda12f18c2b2829090e0300bc0783eadb8c399fd51fde6e870a5c7ca4f9b4e12beeeafd539527be26b5d1b144c9f290da62cc7e74f0321962386c72998e09603a83df657b9c177c4baa80bfbe4241a109fee6e6b3725f523d23dfde3f56716953fd0799b49fa4edba8fe1e9124ea0964f44adc51938f8dc5307c42d926fa99dd7066e9bcbc9a8761875f1f7", 0xb7, 0xcc4}], 0x200000, &(0x7f00000009c0)='&nodev\':\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/73, 0x49}, {&(0x7f0000000100)=""/175, 0xaf}], 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000a00)={0x4, 0x0, [{0x2e3, 0x0, 0x8000}, {0xbea, 0x0, 0x54a}, {0xcca135be51fdef03, 0x0, 0x81}, {0xb4e, 0x0, 0x8}]}) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0xd8400, 0x0) getsockname$netlink(r2, &(0x7f0000000240), &(0x7f0000000280)=0xc) fchmod(r2, 0x0) [ 754.062640] audit: type=1400 audit(1556724875.627:15157): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x1d83fa1) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001980)={0x5, 0x0, [{0xd001, 0x1000, &(0x7f0000000780)=""/4096}, {0x0, 0xef, &(0x7f0000000100)=""/239}, {0x4, 0xa5, &(0x7f00000003c0)=""/165}, {0x100006, 0xac, &(0x7f0000000480)=""/172}, {0x0, 0x0, 0x0}]}) 15:34:37 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x4, 0xffffffffffffffff) ftruncate(r0, 0x200) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x43fd) finit_module(r2, 0x0, 0x0) [ 754.255806] audit: type=1400 audit(1556724875.877:15158): avc: denied { map } for pid=22018 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:37 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:37 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) dup(r0) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="290000002000190710003fffffffda0602000080ff0f0001040000040d000600000000000000000001", 0x29}], 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) 15:34:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x3000, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000000)={0x0, 0x5d7f767f, 0x1000, 0x1dba697f, 0x1, @stepwise={{0x7}, {0x3f, 0x8c}, {0x10000, 0x4}}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:34:38 executing program 4: r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x10) open(0x0, 0x0, 0xfffffffffffffffd) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x1c2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x682, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x80004) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) sysinfo(&(0x7f00000007c0)=""/154) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 15:34:38 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x7fff, 0x400) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000280)) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xfb, 0x4, 0x4, "15c5bc1b86bc7c4fc9c5d32083bcbeb6", "c6de89a1af179cbdf31c13120728e7243591c33e41751eb45c78f6d866775ed503516df6992e3d7436c8720e5295b70d7b02fd73e280212ef3bbe73e86bd5cd743e16f2030e1724fd082b37aaf257aa8e640438a52fb7c594497596204605d366af17971548f971087f8e86fd9203ea92f4fed9fc66c5144326794b78fb8234845aca8758c2cf876db612f42224a21ee68c894eabfe6e1bfeb6c65bf3ae335fed03bf11474a64e9bbbfacd150cd5b5478679659194530d5a760b3f750a6ba34bce3f84dbf11811e4b4c8395446cad3950a17ebda2a8dc6543186b4eeada331b93147878d6ec3"}, 0xfb, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000300)="800f00001000110019000300e600000000000102000000000100000009000000004000000040000080480000000000006d5ebe5a0000fff053ef", 0x3a, 0x400}], 0x0, 0x0) 15:34:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0xa9, 0x0, [], {0x0, @reserved}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getpid() setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x140, &(0x7f0000000480)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02', 0xffffffffffffffff}, 0x30) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={<r3=>0xffffffffffffffff, r1, 0x0, 0x140, &(0x7f0000000680)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02', 0xffffffffffffffff}, 0x30) r4 = syz_open_procfs(r3, &(0x7f0000000840)='net/ip6_mr_vif0\xa0\x00ie\xec\x1d\xac: H-,\x1d\x17\x12c\x1a6\xaeHq\xc9\xed\x8a\xd6r\x1e\xf5\xacQeq\x8f\xf7\xa8\xc4\xef\xf8].') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) clock_gettime(0x0, &(0x7f0000000240)={<r5=>0x0, <r6=>0x0}) write$sndseq(r2, &(0x7f0000000300)=[{0x3, 0x7, 0x4, 0x0, @time={0x0, 0x1c9c380}, {0xcb00000000000000, 0x6}, {0x1}, @result={0x800, 0x3ff}}, {0xff, 0x400, 0x4, 0xb4d2, @time={0x77359400}, {0x3, 0x8001}, {0x0, 0x6}, @time=@time={0x77359400}}, {0x8, 0x10000, 0x8000, 0x8, @tick=0x6, {0x1, 0x80000000}, {0x0, 0x52a}, @result={0x1f, 0x200}}, {0x5, 0x81, 0x4, 0x5, @time={0x77359400}, {0x100000001, 0x26}, {0xfffffffffffffffd, 0xfff}, @time=@time={r5, r6+10000000}}], 0xc0) 15:34:38 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) fadvise64(r4, 0x1e, 0xd8, 0x7) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x120000000000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r0, 0x10d, 0x3f, 0x0, &(0x7f00000000c0)) 15:34:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000600)='user\x00', 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b", 0x1c, 0xfffffffffffffffb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x2, 0x20040) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='overlay\x00', 0x8, 0x0) r4 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="86511f380ac986b40ad9aaa2e7bd86047bc60ff863bf728ad568"], 0x1}}, 0x44801) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)=0x3) accept4$unix(r4, 0x0, &(0x7f00000001c0), 0x80000) getsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000500)=""/184, &(0x7f0000000080)=0xb8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0xffffffffffffff9d) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) timerfd_gettime(r3, &(0x7f00000003c0)) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xe) setsockopt$inet6_dccp_int(r4, 0x21, 0x4, &(0x7f00000000c0)=0x3ff, 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={<r5=>0x0, <r6=>0x0}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000340)={0x6, 0x0, 0x4, 0x2000, {r5, r6/1000+30000}, {0x5, 0xc, 0xfff, 0x80, 0x100000001, 0x5, "b06a8b18"}, 0x0, 0x7, @planes=&(0x7f0000000300)={0x6, 0x1000, @userptr=0x5, 0x3}, 0x4}) epoll_create1(0x80000) 15:34:39 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:39 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0xe, 0x80800) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x18000000000000, 0x2) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="716ac332dc195fe73f5ce9073f900be8a5fd63ce59ee839cd1d6c7d0cf855591b47de2fd150ed533", 0x28, 0x10, 0x0, 0x0) 15:34:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000001680)=[{&(0x7f0000000100)=""/231, 0xe7}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)=""/254, 0xfe}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/117, 0x75}, {&(0x7f00000005c0)=""/143, 0x8f}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x7, &(0x7f0000000040)}, 0x7fff}, {{&(0x7f0000001740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000030c0), 0x0, &(0x7f0000001b80)=""/16, 0x10}, 0x20}, {{&(0x7f0000001bc0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/179, 0xb3}, {&(0x7f0000002d00)=""/104, 0x68}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/171, 0xab}, {&(0x7f0000002e40)=""/136, 0x88}, {&(0x7f0000002f00)=""/36, 0x24}], 0x7}, 0x9}], 0x3, 0x10000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000026007f000000000000007701000004ff0100000000000018ffffffff0100ff10", 0x24) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfd8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x20000080) 15:34:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) 15:34:39 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lookup_dcookie(0x2bd7, &(0x7f0000000480)=""/225, 0x90f2197c2500cb3a) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 757.234072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22142 comm=syz-executor.1 [ 757.350130] net_ratelimit: 20 callbacks suppressed [ 757.350136] protocol 88fb is buggy, dev hsr_slave_0 [ 757.360277] protocol 88fb is buggy, dev hsr_slave_1 15:34:40 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) fadvise64(r4, 0x1e, 0xd8, 0x7) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0xa}) 15:34:40 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8003, &(0x7f0000000280)="0adc1f123c323f31bbd070448801010000157f588dfd9de5013974002920bbaa71f115a9961e3f85df27b154c30dead14fcb05168ba809") syz_execute_func(&(0x7f0000000000)="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") [ 757.539379] kauditd_printk_skb: 189 callbacks suppressed [ 757.539389] audit: type=1400 audit(1556724880.457:15348): avc: denied { map } for pid=22139 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 757.742896] audit: type=1400 audit(1556724880.477:15349): avc: denied { map } for pid=22143 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 757.830133] protocol 88fb is buggy, dev hsr_slave_0 [ 757.836898] protocol 88fb is buggy, dev hsr_slave_1 15:34:40 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x65) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000100)="94e1c8151eca5ec59eb11500000e4d7550d3ce4868", 0xab149c5f, 0x4, 0x0, 0x26c) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 757.929101] audit: type=1400 audit(1556724880.477:15350): avc: denied { map } for pid=22143 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:40 executing program 2: pwritev(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000000c0)="87", 0x1}], 0x1, 0x0) 15:34:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockname$ax25(r0, &(0x7f0000000080)={{0x3, @default}, [@remote, @netrom, @netrom, @default, @netrom, @default, @bcast, @bcast]}, &(0x7f0000000100)=0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 758.070157] protocol 88fb is buggy, dev hsr_slave_0 [ 758.075331] protocol 88fb is buggy, dev hsr_slave_1 [ 758.093705] audit: type=1400 audit(1556724880.497:15351): avc: denied { map } for pid=22139 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.280127] audit: type=1400 audit(1556724880.537:15352): avc: denied { map } for pid=22143 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.310216] protocol 88fb is buggy, dev hsr_slave_0 [ 758.315341] protocol 88fb is buggy, dev hsr_slave_1 15:34:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x280}) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) pause() ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 758.395349] audit: type=1400 audit(1556724880.547:15353): avc: denied { map } for pid=22143 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:41 executing program 2: r0 = geteuid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x6) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x12, 0x100000000004002, {0x5, 0x1, 0x6, 0x1000000000}}, 0x30) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) r4 = add_key(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r0, r4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x10200, 0x2, 0x3000, 0x2000, &(0x7f0000002000/0x2000)=nil}) ioctl(0xffffffffffffffff, 0x0, 0x0) rt_sigpending(&(0x7f0000000180), 0x8) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, 0x0) [ 758.470133] protocol 88fb is buggy, dev hsr_slave_0 [ 758.475271] protocol 88fb is buggy, dev hsr_slave_1 [ 758.549149] audit: type=1400 audit(1556724881.067:15354): avc: denied { map } for pid=22156 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000000c0), 0x0, 0x700) [ 758.696427] audit: type=1400 audit(1556724881.077:15355): avc: denied { map } for pid=22156 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:41 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) write$P9_RWSTAT(r2, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) 15:34:41 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x80000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 758.890652] audit: type=1400 audit(1556724881.097:15356): avc: denied { map } for pid=22156 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) fadvise64(r4, 0x1e, 0xd8, 0x7) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 759.038274] audit: type=1400 audit(1556724881.107:15358): avc: denied { map } for pid=22161 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:42 executing program 2: 15:34:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='c\xc0Iu\x1b\xd5\xb8\r\x83\x95\xf9~\x10\xc2\x19\xb0\xf4\x84\xc9(\xc1(>\xb0!+`#\xba\xe4D\xc7\x9d\x0ed\xcd\xe3\xfc\x8e\xbf\x9f\xed\xfe&\x8bi\x1c=\xd9%\x90)oF\x15\xf3\x88T#\xcc\x0e\xb2\xc7\x95e\x1dAQ\xb7Ki\x1e\xf8 \xc8\xce%6\xc4L\x8c\xbf \xc5\xca\xb5\xba\xd6C\xbd\xf2\xae\x1a\xf0\xb1\xa06\xce\x132\xa3\xb6:\xfd\xfd%\x9f\x97V\x98\x97\xf3\xdbV~V\x81\r\f\xd1\xd1\xa5\b\x92W\x14\x9a\xcb\x06\"\xe3\xc5\xf1\xc6LV\x80\x0f\xb5YE:\x84U\x96\xd7\xfe\xcf\f\xf9\x863\xeb\x936\xb2q\xefPG2\xb70\x86}e\xb6\x80EE\xbf\x828\xdfm\xa3\xc7\x8b\xa5\xd8\xe9Z\xb1\xb8}tV\xb9\xdaz[g\x98x\xc8Mw\\\xc5\x81\xb9\x1e\xa3a\xe9;\xf1\xc2#\x81\xf0@\xa22\xc51V\xfd\x88\x0e&/\xd0\x89LA\x16ng\xe70s\xd9\xc3\'\x13W\xb9\x95\xcd\xc51\x92hh\xcd\x13\xe6\x150A\x95\xb4\xe1?\xf6\xa2\xc1\xd3\xde\\\xb5') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) preadv(r3, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/181, 0xb5}, {&(0x7f0000000180)=""/171, 0xab}], 0x0, 0x700) 15:34:42 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) socket$unix(0x1, 0x7, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f00000000c0)={@remote={[], 0x1}, 0x1, 'bcsf0\x00'}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0xfffffffffffffc1a) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:42 executing program 2: 15:34:42 executing program 1: 15:34:43 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=<r1=>0x0) getresuid(&(0x7f0000000200)=<r2=>0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f00000002c0)={0x8, 0x6, r1, 0x0, r2, 0x0, 0x56f02184}) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xffffffffc, 0x20080000003) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={<r5=>0x0, 0x5}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000380)={0x400, 0xffffffff, 0x8000, 0xfffffffffffffe00, 0x6, 0x400, 0xffffffffffffff81, 0x8, r5}, 0x20) syz_execute_func(&(0x7f0000000000)="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") 15:34:43 executing program 2: 15:34:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000001c0)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) fadvise64(r4, 0x1e, 0xd8, 0x7) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:43 executing program 1: 15:34:43 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) fchdir(r1) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket(0x0, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:43 executing program 2: 15:34:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth0_to_team\x00', 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) tee(r2, r2, 0x800, 0x8) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000280)={0x7fff, &(0x7f0000000140)="e01c8b89185c2e9116833309e62d4ac81434a0a93e80c9338c39dbb10f077a7037b39f6e642b9cd549698e8d703e2da43458e78a5240dcb35aace50980ee"}) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x17, &(0x7f00000001c0)='+j}-o&self@(cgrouplolo\x00', <r3=>0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r3, 0x4) syz_execute_func(&(0x7f0000000000)="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") 15:34:44 executing program 1: 15:34:44 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:34:44 executing program 1: r0 = dup(0xffffffffffffff9c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cubic\x00', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r2 = gettid() clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x10e, 0x9, 0x20000000000004, 0x1, 0x0}, 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) wait4(0x0, 0x0, 0x0, 0x0) 15:34:44 executing program 3: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") socket$vsock_stream(0x28, 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:34:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") clock_adjtime(0x0, &(0x7f0000000240)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1ff, 0x0, 0x2, 0x2, 0xc561, 0x80, 0x4, 0x8, 0x7, 0x80, 0x1f, 0x3ff, 0x5, 0x10001, 0xfff, 0x52, 0x3, 0x1, 0x9b11}) 15:34:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000900)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5, 0x0, [{}, {}, {0x0, 0x7f, 0x0, [], 0x6}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}) 15:34:45 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, <r1=>0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\x98\xd1\x00\x00BR\xd7\x1fW,\xf6\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J\x00\x04\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1\x11.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x10000, 0x0, 0x0, 0xffffffffffffffff, 0x4}) 15:34:45 executing program 1: clock_adjtime(0x0, &(0x7f0000000240)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 762.470142] net_ratelimit: 20 callbacks suppressed [ 762.470148] protocol 88fb is buggy, dev hsr_slave_0 [ 762.480581] protocol 88fb is buggy, dev hsr_slave_1 [ 762.543482] kauditd_printk_skb: 183 callbacks suppressed [ 762.543491] audit: type=1400 audit(1556724885.467:15541): avc: denied { map } for pid=22257 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 762.630157] protocol 88fb is buggy, dev hsr_slave_0 [ 762.635317] protocol 88fb is buggy, dev hsr_slave_1 15:34:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) [ 762.669700] audit: type=1400 audit(1556724885.497:15542): avc: denied { map } for pid=22257 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 762.710127] protocol 88fb is buggy, dev hsr_slave_0 [ 762.715309] protocol 88fb is buggy, dev hsr_slave_1 15:34:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @dev}, {0x2, 0x0, @local}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) write(r1, &(0x7f0000000140)="150000000800080000000000c86b6525000010", 0x13) [ 762.863888] audit: type=1400 audit(1556724885.507:15543): avc: denied { map } for pid=22257 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002480)=""/4096, 0x1000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(0xffffffffffffffff, 0x7fff, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffff45, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000200)={0x4, 0x1484, 0x6}) 15:34:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000002c0)=0x8000000) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_emit_ethernet(0xde, &(0x7f0000000180)={@remote, @empty, [{[{0x9100, 0x4, 0x7, 0x4}], {0x8100, 0xd968, 0x6, 0x4}}], {@x25={0x805, {0x1, 0xfffffffffffffffb, 0xfb, "18314ec4906f358f22495992a96267f5a25ce517e5dda5f3d0dca48f17b22e6dd22d5fe246cb7bc334342cad5629e30f695a3bb69f36c64d2044cf153ef27c9c582cca59578677a339284b1989f17fda6557365a594e13643825b5d50df4bb246a1dba9614c9306837b6d2ed21b2aad21475ed493c3bcbdbce3f846d50c5baa7f0cd0ef8b25b8749360368d210ba3da722e8d0e22554d265b506bd96467581324a5ced856d8994681371baf5c9933dbf3fa0f6dabdb91ae9caf70759d0171b3603f6cdc6ce"}}}}, &(0x7f0000000280)={0x0, 0x4, [0xb97, 0x3d7, 0x9f6, 0xacb]}) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) [ 763.017565] audit: type=1400 audit(1556724885.537:15544): avc: denied { map } for pid=22257 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:46 executing program 5: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x34) [ 763.176002] audit: type=1400 audit(1556724885.547:15545): avc: denied { map } for pid=22257 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 763.272596] libceph: resolve '.u [ 763.272596] ' (ret=-3): failed [ 763.320529] libceph: parse_ips bad ip '.u [ 763.320529] :d]:.,[' [ 763.376873] audit: type=1400 audit(1556724885.557:15546): avc: denied { map } for pid=22259 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20\x00', 0x681, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) gettid() fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0}) readahead(r0, 0xd65c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000500)={0xa0, 0xfffffffffffffff5, 0x2, {{0x2, 0x3, 0x1ff, 0xb6e, 0xc00000, 0x0, {0x3, 0x96, 0x8, 0x867, 0x4, 0x9e1, 0x5cf7, 0x4, 0x80000000, 0x6, 0x5, r3, r4, 0x0, 0x20}}, {0x0, 0x2}}}, 0xa0) r5 = syz_open_procfs(r2, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockname$unix(r1, &(0x7f0000000600), &(0x7f0000000080)=0x6e) preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) 15:34:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = socket(0x22, 0x2, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, 0x0, 0x0) [ 763.589887] protocol 88fb is buggy, dev hsr_slave_0 [ 763.595031] protocol 88fb is buggy, dev hsr_slave_1 15:34:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) [ 763.629819] audit: type=1400 audit(1556724885.587:15547): avc: denied { map } for pid=22259 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 763.780609] audit: type=1400 audit(1556724885.587:15548): avc: denied { map } for pid=22259 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 763.913644] audit: type=1400 audit(1556724885.587:15549): avc: denied { map } for pid=22259 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.030346] audit: type=1400 audit(1556724885.627:15550): avc: denied { map } for pid=22257 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:47 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 764.079935] protocol 88fb is buggy, dev hsr_slave_0 [ 764.085137] protocol 88fb is buggy, dev hsr_slave_1 15:34:47 executing program 2: pause() syz_execute_func(&(0x7f00000009c0)="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") 15:34:47 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") socket$vsock_stream(0x28, 0x1, 0x0) 15:34:47 executing program 1: syz_execute_func(&(0x7f0000000980)="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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8000000008031, 0xffffffffffffffff, 0x0) 15:34:47 executing program 4: clone(0x403502001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000780)="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") accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:34:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) recvmmsg(r1, &(0x7f0000002ec0)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/245, 0xf5}, {&(0x7f0000000200)=""/180, 0xb4}, {&(0x7f00000002c0)=""/47, 0x2f}, {&(0x7f0000000480)=""/194, 0xc2}], 0x4, &(0x7f0000000580)=""/199, 0xc7}, 0x20}, {{&(0x7f0000000680)=@ax25={{0x3, @bcast}, [@rose, @bcast, @bcast, @rose, @bcast, @bcast, @null, @bcast]}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000700)=""/112, 0x70}, {&(0x7f0000000780)=""/153, 0x99}, {&(0x7f0000000840)=""/249, 0xf9}, {&(0x7f0000000940)=""/63, 0x3f}, {&(0x7f0000000980)=""/223, 0xdf}, {&(0x7f0000000a80)=""/53, 0x35}], 0x6, &(0x7f0000000b40)=""/94, 0x5e}, 0x1ff}, {{&(0x7f0000000bc0)=@caif=@util, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000c40)=""/88, 0x58}], 0x1}, 0xfff}, {{&(0x7f0000000d00)=@nfc_llcp, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d80)=""/160, 0xa0}], 0x1, &(0x7f0000000e80)=""/145, 0x91}, 0x8}, {{&(0x7f0000000f40)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000fc0)=""/124, 0x7c}, {&(0x7f0000001040)=""/214, 0xd6}, {&(0x7f0000001140)=""/9, 0x9}, {&(0x7f0000001180)=""/60, 0x3c}, {&(0x7f00000011c0)}, {&(0x7f0000001200)=""/146, 0x92}], 0x6}, 0x5}, {{&(0x7f0000001340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/63, 0x3f}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/179, 0xb3}, {&(0x7f00000024c0)=""/82, 0x52}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000002540)=""/13, 0xd}], 0x6, &(0x7f0000002600)=""/113, 0x71}, 0x5}, {{&(0x7f0000002680)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002700)=""/111, 0x6f}, {&(0x7f0000002780)=""/50, 0x32}, {&(0x7f00000027c0)=""/158, 0x9e}, {&(0x7f0000002880)=""/118, 0x76}, {&(0x7f0000002900)=""/164, 0xa4}, {&(0x7f00000029c0)=""/222, 0xde}, {&(0x7f0000002ac0)=""/60, 0x3c}, {&(0x7f0000002b00)=""/240, 0xf0}, {&(0x7f0000002c00)=""/252, 0xfc}], 0x9, &(0x7f0000002dc0)=""/235, 0xeb}, 0xe6d}], 0x7, 0x40010120, &(0x7f0000003080)={0x77359400}) 15:34:47 executing program 5: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x34) 15:34:48 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) close(r0) creat(&(0x7f0000000100)='./file1\x00', 0x0) 15:34:48 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 15:34:48 executing program 4: syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(0x0) syz_execute_func(&(0x7f00000009c0)="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") 15:34:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x4, 0x7, 0x8000}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x50}, 0x4041) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:34:48 executing program 2: syz_execute_func(&(0x7f0000000b40)="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") [ 766.071889] IPVS: ftp: loaded support on port[0] = 21 15:34:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x175}}], 0x1b1, 0x100, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x319200, 0x0) write$selinux_user(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='system_u:object_r:chkpwd_exec_t:s0 syeadm_u\x00'], 0x2c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ptyp\xca\xef\f?Ve\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\x97\xed\x8d\x8bZ\xb8{}\x89-N\xa6\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\x00'/332) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000001c0)=""/197) pwrite64(r3, &(0x7f0000000740)="7e5b3567f8ae822a9007d0e32ab1e2fa9e343c3465ccf9fa514f9c7f029f0eaae4c43f88f80036829a67932e797abfe73114888a33751dc39feb4d081260d1423e171a5debeb8710ef61d01430ed9962c0a6573c90d6fca6e18d3ec26221acd093465e9d110fd53437651a1ed0930f3029dc7223510500008d453592cd39fd6d79c06d5d1a51a1ef06fadb5b58f7eb0fa800e2dd1eda", 0x96, 0x0) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000700)={0xf4, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="01634040040000000000000003000000000000000000000010000000000000000000000000000000000000005000000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="11634840020000000000000003000000000000000000000001000000000000000000000018000000000000004000000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r3, @ANYBLOB="000000000100000000000000"], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="060000000000000007630440020000000e630c4001000000010000000000000011634840040000000000000001000000000000000000000011000000000000000000000028000000000000001000000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000002900000000000000"], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="38000000000000003000000000000000466ed60995af6afa8eb1da58ac760e89c90aee1f7955521745dbac13f9c820539ed59769437e33b7f1b6e3f692963ef154b2f0f9eee89d637e651b76d00b2612f84c70f2afb4b87a932e31f8a78d0f98bc17667e5e00252ef7540825a2745304871aa122c77a781504c29c15e7ccaea8659e4e8b97e203d9378522e587b49a9e0d982e46b677c09abefff8dc64fa1f59c3872fe4ce191d0a3de50afdffa4551f13086a94e8f2843dc5cd71edffbdcf6a"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], 0x21, 0x0, &(0x7f00000006c0)="2b34b5ea64ba1170b436e1e84eb1759e51c0ccb3afd12bbbdfaa06a8088a863cae"}) 15:34:49 executing program 4: r0 = dup(0xffffffffffffff9c) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r1, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 15:34:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_attr(r2, &(0x7f00000003c0)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x81) semop(0x0, &(0x7f0000000040)=[{0x0, 0x8, 0x800}, {0x0, 0x81, 0x800}, {0x2, 0x1, 0x800}], 0x3) 15:34:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x43}}) 15:34:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x6, 0x4, 0x7, 0x1, 0x8}) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x8, 0x5}, 0x2) bind$x25(r1, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) 15:34:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) getsockname(r0, 0x0, &(0x7f0000000140)) 15:34:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000780)=""/4096, 0x1000) 15:34:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000000)={'icmp6\x00'}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 767.555547] kauditd_printk_skb: 188 callbacks suppressed [ 767.555557] audit: type=1400 audit(1556724890.479:15739): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 767.747796] net_ratelimit: 20 callbacks suppressed [ 767.747802] protocol 88fb is buggy, dev hsr_slave_0 [ 767.758005] protocol 88fb is buggy, dev hsr_slave_1 15:34:50 executing program 1: [ 767.779123] audit: type=1400 audit(1556724890.479:15740): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$inet_dccp_buf(r1, 0x21, 0xcf, &(0x7f0000000080)=""/150, &(0x7f0000000140)=0x96) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:50 executing program 2: [ 767.988849] audit: type=1400 audit(1556724890.489:15741): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:51 executing program 4: [ 768.137438] audit: type=1400 audit(1556724890.489:15742): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x73, &(0x7f0000000180)="baba87e098efb73d77a6884119bba6f48e467ee2ef6b5055232ae3a3e764b1df2ca7030e98e5698f2fa977ddf5baa8b2b03e80820fa1143f") ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 768.227571] protocol 88fb is buggy, dev hsr_slave_0 [ 768.232724] protocol 88fb is buggy, dev hsr_slave_1 15:34:51 executing program 5: [ 768.300273] audit: type=1400 audit(1556724890.559:15743): avc: denied { map } for pid=22392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:51 executing program 1: [ 768.459295] audit: type=1400 audit(1556724890.559:15744): avc: denied { map } for pid=22392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.487526] protocol 88fb is buggy, dev hsr_slave_0 [ 768.492657] protocol 88fb is buggy, dev hsr_slave_1 15:34:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x12c, r3, 0x324, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8d9e}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff24b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcb}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x880}, 0x4000004) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 768.657473] audit: type=1400 audit(1556724890.569:15745): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:51 executing program 2: [ 768.707304] protocol 88fb is buggy, dev hsr_slave_0 [ 768.712458] protocol 88fb is buggy, dev hsr_slave_1 15:34:51 executing program 5: [ 768.817342] audit: type=1400 audit(1556724890.579:15746): avc: denied { map } for pid=22386 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.867235] protocol 88fb is buggy, dev hsr_slave_0 [ 768.872381] protocol 88fb is buggy, dev hsr_slave_1 15:34:51 executing program 4: 15:34:51 executing program 1: [ 769.040549] audit: type=1400 audit(1556724890.579:15747): avc: denied { map } for pid=22392 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.235548] audit: type=1400 audit(1556724890.589:15748): avc: denied { map } for pid=22392 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:52 executing program 2: 15:34:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x31b65691, 0x80, 0x7, 0x400}) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:34:52 executing program 5: 15:34:52 executing program 4: 15:34:52 executing program 3: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000300)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={r1, @multicast2, @local}, 0xc) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1e123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:52 executing program 1: 15:34:52 executing program 2: 15:34:53 executing program 5: 15:34:53 executing program 4: 15:34:53 executing program 1: 15:34:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') timer_create(0x5, &(0x7f0000000180)={0x0, 0x3, 0xf532ef71557e84af, @thr={&(0x7f0000000080)="7cd86ae00fb9418df762c15af6a62a75598c295c298b294778d7eddebd471df798c3d08dd8db6413", &(0x7f00000000c0)="7098a85255e52c6dd195fafc8e2c73425a2d58cf57f53b9acf705bd49cb7070985d6b75fbef3e0416f871a02a2764fa9907cd734959f576df1156db7de9e716793d2bd67ebce4691e259f71b7ef031101dd2e6ccb351b534a5c383cc781dc8d9383e1db65096d9c1f5fae47e005d20111a2619394a9c298d5995a2f8a9c92f73315adb070a3ad9de7f1b7a1acf5718b683b5e911d239afc9aa631496efdb2d997f630c9159e1e92c1004da403665236b8a3b2bf5cdb8ac1ff13ed40cacf6bcd0"}}, &(0x7f00000001c0)=<r2=>0x0) clock_gettime(0x0, &(0x7f0000000200)={<r3=>0x0, <r4=>0x0}) timer_settime(r2, 0x0, &(0x7f0000000240)={{r3, r4+10000000}, {0x77359400}}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:53 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x3) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000180)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) 15:34:53 executing program 2: 15:34:53 executing program 5: 15:34:53 executing program 4: 15:34:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x1}], 0x0, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000080)) r1 = socket(0xb, 0x3, 0x9) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000180)={0x34, 0x5, 0xb, 0x6, 0x49cb}) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x80000, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000001c0)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) write$UHID_CREATE2(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fc000800000200000500000009000000ff070000e108e4910ac2855300cde0644935d06184485c7d31f0224c1844a09389b8257a82478c16ae05acc4f973e2f2575e52b44a973570fd91f1b5558a0de98c6dcb060a6fcb1c167abef905ac8eaa454e7c19919ac39aa1c05df18e62aa09867ec76071bb419ffda8e9a5d5c0beb37f1b727f39124fc276dffe464abc62a70ad9991735c53524c9b7ff131365b1fceb4a29640ca7bba8382d7d0af3212a57cbb05d97ad15922554d8ccd7c9ab0ee29f09bf114acaf2320f17c576524cf2373f6791479e2099fab594f37fd97d8a4b64caaf88a88f1b2fd25d2215afb37a3bc4eb368d3cbbefd768e08305b07ca78504379dcebdc74247b65d216400000000"], 0x214) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000280)=0x28, 0x4) 15:34:53 executing program 1: timerfd_create(0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:34:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4610f6ff000000000000000008030003000000df87000000003800000000000000080000000000200001000000"], 0x30) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x200}, 0x120) 15:34:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x11, &(0x7f0000000040)=@assoc_value, &(0x7f0000000140)=0x8) 15:34:54 executing program 1: ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x27f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x108, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000002c0)="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") r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x5, 0x700, [0x0, 0x200003c0, 0x200003f0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x9, 0x88e5, 'vcan0\x00', 'veth0_to_bond\x00', 'eql\x00', 'yam0\x00', @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x29}, [0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x5, 0x6d, 0x0, 'veth1_to_team\x00', 'rose0\x00', 'team0\x00', 'bridge_slave_1\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="bad9193a27cf", [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0xf8, 0x158, 0x188, [@mark_m={'mark_m\x00', 0x18, {{0xfffffffffffffffe, 0xe790, 0x2, 0x2}}}, @ip={'ip\x00', 0x20, {{@rand_addr=0x2, @dev={0xac, 0x14, 0x14, 0x1c}, 0xffffffff, 0xffffffff, 0x3f, 0x2e, 0x11, 0x20, 0x4e24, 0x4e24, 0x4e24, 0x4e21}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x5, 0x1, 0x0, 'rose0\x00', 'bcsf0\x00', 'nlmon0\x00', 'gretap0\x00', @random="40c327fa0b26", [0x0, 0xff, 0xe89f2a5dbb34c421, 0xff, 0xff], @dev={[], 0x1e}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x108, 0x140, 0x190, [@helper={'helper\x00', 0x28, {{0x1, 'tftp-20000\x00'}}}, @limit={'limit\x00', 0x20, {{0xa32, 0x0, 0x4, 0x8000, 0x8, 0x5}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfddb2143537a8359}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x1, 0x7fffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x3, 0x4, 0x1f, 'lapb0\x00', 'team0\x00', 'ip_vti0\x00', 'erspan0\x00', @random="9a8d46976f7a", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa8, 0xf8}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x4, 'syz1\x00', 0x3}}}}, {{{0x0, 0x4, 0x992f, 'bridge0\x00', 'syzkaller1\x00', 'syzkaller1\x00', 'veth0_to_team\x00', @random="51de07824d0e", [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff], 0x130, 0x160, 0x190, [@ip={'ip\x00', 0x20, {{@dev={0xac, 0x14, 0x14, 0x13}, @empty, 0xff000000, 0xffffffff, 0xffffffff, 0x32, 0x8, 0x0, 0x4e21, 0x4e20, 0x4e24, 0x4e24}}}, @ip6={'ip6\x00', 0x50, {{@remote, @mcast1, [0xff, 0x0, 0xffffffff, 0xffffffff], [0x0, 0xffffff00, 0xffffff00, 0xffffffff], 0x4bf4509b, 0x7f, 0x4, 0x2, 0x4e23, 0x4e24, 0x4e23, 0x4e23}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}]}, 0x778) 15:34:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x200000003) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x1) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000040)) dup3(r1, r1, 0x0) 15:34:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:54 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x801) mkdirat(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000000)) close(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x8001}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x7, 0x8) 15:34:54 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = semget(0x2, 0x2, 0x200) semtimedop(r1, &(0x7f0000000180)=[{0x1, 0x1, 0x1000}, {0x2, 0xfffffffffffffe4b, 0x800}, {0x0, 0x6, 0x800}, {0x7, 0x3, 0x1800}], 0x4, &(0x7f00000001c0)={0x0, 0x989680}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:34:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fallocate(r0, 0x40, 0x614, 0x2049) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000140)="992c25964c0f05bf00000020c4a37bf0c5bf41e2e9c422e9aabb3c00000064f3460f1b28000040aa110f4e5bc4a265aa104b26366ec1e54e1b21045f4607c421dd589fc4e10bf8410fbaf500a426a42645f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efc4c3194198ac77000007459d6766f2ab440fec3f67ddea03660f76a9c42159efdf0fb1f72e835b5b899294d800000000000fc4634148f70000c2a0c10b00cc8f0000000f9f3c6436b266450fc4650000c4e39978c104d9a1e8719e70672e66660f3810a0fbbdc12fcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd243caca460f2ad0f30f5ea5a9a50000ffff660f79ca5536f347aab03a00a2f1fbfb761b08cf") write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x20, 0x3, 0x6}, 0x6}}, 0x18) 15:34:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 15:34:55 executing program 0: syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x81, 0x8040) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 772.566365] kauditd_printk_skb: 193 callbacks suppressed [ 772.566374] audit: type=1400 audit(1556724895.499:15942): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 772.569282] 8021q: VLANs not supported on lo [ 772.576462] audit: type=1400 audit(1556724895.509:15943): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 772.865554] net_ratelimit: 20 callbacks suppressed [ 772.865560] protocol 88fb is buggy, dev hsr_slave_0 [ 772.887957] protocol 88fb is buggy, dev hsr_slave_1 [ 773.025549] protocol 88fb is buggy, dev hsr_slave_0 [ 773.030729] protocol 88fb is buggy, dev hsr_slave_1 15:34:56 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x801) mkdirat(r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000000)) close(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x8001}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x7, 0x8) 15:34:56 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) lstat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 15:34:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000080)={0xffffffffffff0000, 0x81, [0x658d07c9, 0x96f800000000, 0x40, 0x9], 0xffffffffffffffff}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r0, &(0x7f0000000140)='p', 0x1) [ 773.061493] audit: type=1400 audit(1556724895.627:15944): avc: denied { map } for pid=22504 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.105565] protocol 88fb is buggy, dev hsr_slave_0 [ 773.110768] protocol 88fb is buggy, dev hsr_slave_1 15:34:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x201, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)=ANY=[@ANYBLOB="070000003a0c000047fcffff000000000800000000000000f7ffffff000000000900000000000000000100000000000006000000000000004e0000000000000008000000000000000000000000000000280000000000000001040000000000003a000000000000003b040000000000e01f00000000000000"]) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffea8) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup3(r0, r2, 0x0) dup2(r0, r1) [ 773.235532] audit: type=1400 audit(1556724895.657:15945): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.368912] audit: type=1400 audit(1556724895.667:15946): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.551844] audit: type=1400 audit(1556724895.732:15947): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x184a, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") accept$alg(r0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="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") 15:34:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x3) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000000c0)=""/85) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 773.720580] 8021q: VLANs not supported on lo [ 773.873225] audit: type=1400 audit(1556724895.753:15948): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:56 executing program 4: write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000240)={0x7, 0x7f, 0x1}, 0x7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f00000002c0)="027892a393a9495385738d227dc33476999cefcc8a4ad57daf44af7b428a4dbcf79fc1280cc2221784c9acc3e8b90d3804ae3d427a9be04207bee98441722bf6a79ee867fea2fac8090cfe5033a3186a9490624ea65a834ad3a055cf940f5aa573460ed0a9356b33f229f119e8aac9b325a1bf73356160537cd9783f5335faa6e50cb5fe", 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000142000/0x2000)=nil, 0x2000, 0x5, 0x3011, r1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)={0x1, 0x6, 0xfffffffffffffffc, 0xffffffffffff8001, 0x4, 0x5}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x20000000000000) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0x4) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 15:34:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000280)='R}cpuset{\x00', 0xfffffffffffffffa) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000340)="01890000620000288ac671204c9fa3dfd360116cdf4e77dec8c87f6b104f07bebf", 0x21, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r2, r2}, 0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={'poly1305-generic\x00'}, 0x0, 0x14}) [ 773.985541] protocol 88fb is buggy, dev hsr_slave_0 [ 773.990807] protocol 88fb is buggy, dev hsr_slave_1 [ 774.097471] audit: type=1400 audit(1556724895.819:15949): avc: denied { map } for pid=22514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:57 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x6d, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001780)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001800)={{{@in=@rand_addr=0x100000000, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 0x4e22, 0x81, 0xa, 0x80, 0x80, 0x87, r2, r3}, {0x1ff, 0x5, 0x6, 0x2, 0xbf, 0x9d2, 0xe6, 0x1}, {0x8, 0x9, 0x7, 0x1}, 0x9, 0x6e6bb1, 0x1, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x3c}, 0x0, @in=@local, 0x0, 0x2, 0x2, 0x8, 0x3, 0x8, 0x7}}, 0xe8) [ 774.278551] audit: type=1400 audit(1556724895.819:15950): avc: denied { map } for pid=22514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:57 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x80ffff}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r1) [ 774.465600] protocol 88fb is buggy, dev hsr_slave_0 [ 774.471405] protocol 88fb is buggy, dev hsr_slave_1 [ 774.507767] audit: type=1400 audit(1556724895.829:15951): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x2, 0x2403) 15:34:57 executing program 2: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f0000000240)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x4, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x2, 0x0, &(0x7f0000000580)=<r1=>0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYBLOB="b4156ba6bf26608f360860dbf9d2e21f15fa0300435b07a9a05685a81a5eb9dcda30efc3964ff7acbabf9eb95181bde201c9ad904f1057c04f1ba6513176b80f8597dbf66d82b50ba2cf9569617acca8c5ba527dfc7822e0e219bc1642d51eacc663b8bf768b45c3a822e6224f71e475c8c11cd57c69e9d29b57c0cfd1e6bfd95daa0080d77edd56b072558bf600ab3fabeadfd7dc59037f699a6db8231888", @ANYBLOB="0d042e3aa47470f521fd6b912b020feda3d9a50cf2eb4a12ffc64fd543afce2e0eb513fe1a1927d6f604053ffe6ec6acea1339e0393ea9ed57f43a5569c8d5e2a7d35587d448635cc4d4b9d524fc5c313452eac5f4fbcdc85688fdd29a88e603802d2708cc9f0ce18fa44594103df25cb20ee6728eb7c1ec1729b317a93a9fea413bc02984916f1277d148be3d8d3deb9dcf110ee8c41d8a75dc7034e130faa85316ef07459b459a29efc6ecd77be0", @ANYRESHEX=r2, @ANYRES32=r2, @ANYBLOB="09c5759bfcc395d6c3a47a799da84ff27ba463c145dc3087876f696a36bc992f543e02b57d38996e086ccb6f264f334d23e6133e7ae0c55ee7b3d8ad4688c26a4158438d0c5722d5c62d6aa1ed5b0172910f0b0081fa5d9c97ce9ed2c5db04278b82cf54103ccca5b97d38057829d31964bf1ac5ca597ec35b8c5f34446b43d50c216f01434ffca0ca8e8cd43b40b63529546316efbefda941ef681c9214d463f99b21fc3041befc12081cb245b4", @ANYRESDEC=r1, @ANYPTR], @ANYRESHEX=r0, @ANYRES64=r1]], 0x8) timer_create(0x7, 0x0, 0x0) fcntl$addseals(r2, 0x409, 0x8) epoll_create(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 15:34:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4e97, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4002, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000900}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2d978e87077e7370}, 0x20048085) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept4(r0, 0x0, &(0x7f0000000080), 0x800) 15:34:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x4002) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0x1, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000002c0), 0x4) 15:34:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="3e8c93aa4f4462daf6a27ea6d7bf7d30da2aecf4ed119ea3d3853070f4c6b19b91674c38d4bdc1c1c380a01e35cd1c692a49961130c80f2323f7b5297aec8511533ccebb5e523738361356a808d62b1aff8eae49734d0a0b93ae6479efe84313b0f40f9b83c3abc47e883f4905a8c21171b8f2d457206d5dadf330aecee479be7bd206aa0845457c46be0cb23445f274f6f61321f7d1635f432c834873ec8b", 0x9f}], 0x1}, 0x4000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000002c0)={0x1, 0x1000, 0x400, 0x8, 0x11, 0x20}) sendfile(r1, r2, &(0x7f00000000c0)=0x202, 0xdd) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") write$P9_RCLUNK(r0, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000001c0)={0x7, 0x4, 0x5, 0x7, 0x1000}) syz_execute_func(&(0x7f0000000000)="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") 15:34:58 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x400000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e23, 0x5, @mcast1, 0x9}, {0xa, 0x4e24, 0x4, @mcast2, 0x1}, 0x5, [0x1, 0xffff, 0x1ff, 0x101, 0x44e1, 0xffffffffffffff7f, 0x80, 0x2]}, 0x5c) getpgid(0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={<r2=>0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0, r2, 0x7}) ptrace(0x10, r1) rt_tgsigqueueinfo(r1, r1, 0x1e, &(0x7f00000001c0)={0x2d, 0x5, 0xd38a}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 15:34:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000080)={0x1000, [0x0, 0xfffffffffffff8a4, 0x0, 0x1, 0x5, 0xffffffffffffac9e, 0x100000001, 0x7ff, 0x401, 0xfffffffffffffbff, 0x8, 0x4, 0xff, 0x4, 0x3, 0x10ba0, 0xff, 0x3, 0x0, 0x83d, 0x3, 0x9, 0x10001, 0x7ff, 0x8, 0x200, 0x2000000000000000, 0x6, 0xffffffff00000000, 0x0, 0x400, 0x1, 0x8, 0x3, 0x73, 0x9, 0x2, 0xfffffffffffffeff, 0x3f4093058, 0x3, 0x5, 0xe6ef, 0x100, 0x2, 0x8, 0xffffffffffffff81, 0x6, 0x8], 0xe}) 15:34:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000040), 0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x119001, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x3, 0x8) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e24, @multicast1}, 0x10) openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x32) 15:34:59 executing program 4: rt_sigtimedwait(0x0, &(0x7f0000000140), 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x8}) write$cgroup_int(r0, &(0x7f0000000040), 0xfd71) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) 15:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000a3c000)=0xfffffffffffffc40) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r3 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r3, &(0x7f0000001240)={0x2, 0x0, @dev}, 0x10) connect(r3, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) ioctl(r3, 0x1000008912, &(0x7f0000000040)="00f2ff00000000019bd070") r4 = socket$kcm(0x10, 0x400002, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e431d00000081fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) sendmmsg(r3, &(0x7f0000000680)=[{{&(0x7f0000000180)=@isdn={0x22, 0x1000, 0x3, 0xffff, 0xffff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)="f88ec2cd353d1bfa74d9db38594d03405db4e1275ea226c3f0f3c62f2135597ca2c689a29427fd2c7b11d7b2196eb6226d21a3099a3aace4929444e2b4ebd7504b9fec14f01f44134ae51115142c288ce8a9ec4d70cde665573e2934d0c676f1b77a42f866fafe4ea01e78d1be0733b43b72e0a20bde41ee6533f8bead00e45185ddd191ed21c8983262640734eb5485249d72f1c1a070a2fe0af2422dddae9416df257cc654fcb7ae0290437a97f5c82fe2ad4593bdefc38e11fdf977d146534c6b5df2556c15545601647fb7c89265855e12506d6804c4bebd42b563af4d962e3860f09946d8e0117da7869663", 0xee}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000000300)="1767652b6329fc7db03d95c59107e8cbc485728af857c61ff1a3d174f3e147316e2ff0e0ec6e687b4b037e6e3fc064bfd82ce9bcf4d5f05034ffb9a174027ea58bcbe86f7c8446c641b6f6041f6ed169bed12b77600514bf", 0x58}, {&(0x7f0000000380)="a2f59b6825cb4484c0921e11ec4569c2fbdfa549cd31be8dcb361e8132f6b3fd96811afd8510610c9e2df407ac024341af3d11b7c43c9eebec027ac51a8ae84a3362113cffa3cb77114eae29c68888ef9a6e3ae94799cc34bc0cb5faa4fcbaebb081140a59657247da", 0x69}, {&(0x7f0000000400)="731bae1e3412a683ea6412f75b8d2f904c758cc6ba4ff53dfe5ca7deac956dfd6ad89ab0c98568d4ba4cc7a356b7d1811de6124777619bb29cda1ccb4fbcc77f2b79d8b940b2a22a4c5977d214b27d", 0x4f}], 0x5, &(0x7f0000002640)=[{0x38, 0x111, 0x57, "5ae48531d3f5a72676cbe11c60e913e40241bea199fa3210bd0751ba7c6c6cca36a7fe25fb73b23f"}, {0x98, 0x11f, 0xffffffff, "eb769c89ebb10caf79a6ee829b7597928e610a14959dfd2e887dd6e80e086a4424b567b61e92c8a8c11f406fc463671d9904204152ad6ddd8e348483908dd43cb34f36176d14bfb399006d7fba2053d445f02dad5ec688545b7cd8ace79b6a0441a0240a02420647d935264118a1f6475ace7209e41965cc87496f55fc8754d2112c25"}, {0x110, 0x12d, 0x4, "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"}, {0x1010, 0x84, 0x4, "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"}, {0xd8, 0x118, 0x2, "3ef87a8b3bf566caf0537a97ad40f02e8f9899c7fac68d0e8ba92862b2931eddc7f4c4a9b42d718c98e43d60488eabd98dcb931e94d70bdee77e35d0004ebab8f473c1b60b8d457ecf0e191fea0c94019b8e7e3c5d944439a5448bec76b39ef59ca7766bd266f243ce18ede8b3a6e355b81b169d79d58584778fdbf9ebe2024189dbc12fcdf9234d02d4fed76090ac524afc689ba4d312ab078c9ca13bf3ce019127e78f6da564ac7cbf94fa37d91fb2bd6a448640b17582dc585ebd0f3c08f0bef123"}, {0xf0, 0x111, 0x5, "df8f48c502dfc841b0753d65128150153071d4b211ed9092e303bfa86ef6c0dc7f0e9d69918e3467af294b15d20351bb643822869bcb560555c01e178f0023418a22a099ca819a7a74357340947730841e982f25c0a06ca6a905f62e51c673e5d17f11307ff9747041b2d9636c7e4a135d8afd79b36a6390d571b22780ea3ac6476d35bab99718dbeea58803fcb6157646ba073f54997764678ed9e659f9a79b091c18993dcdb44eed07edc20f2e9cb4da7769b66c43eb3e720f6a066cacb540ab5d5edabb008b373fdb3025259100a10eb27567cae4cb89191b171698"}], 0x13b8}}, {{&(0x7f0000000500)=@generic={0x11, "aece2f8ceb1e590f066c84b9198367a5af19de171340605ff7f1989de7d5d4e774ba8ec0a0a8871eda0d1a87767d3ad7d6874772dbecde3dd8b04ac1461f26522f410874e1e0dfc0760f48fc720c23629b411f51d9324a98d9500784e840b6796a036c2f6a5868a7fc3dd319734486f9eddaece7492053d6e342dc87dee4"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000580)="45f47619d0785eb1f8ea84ab56811f8d02fc1f3365f871ccd57fc74ddc209565dd3456d3b93073b3332254d1556f7856764dc2b737e896d8ed61712bf49c6490815c592e27fadf8e0276697b5f9385a64d8fe4438651f682ff6280167eed5185a17cb68e6615524e7db796", 0x6b}, {&(0x7f0000003a00)="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", 0x1000}, {&(0x7f0000000600)="7f84df5157c9a55de6b9e21a637e66dab35c7615bec183cec1d3b10169fe0e31108d98041b99fef1187dceccb3cb878a8e9822dea582860f5d0bddf274282ba977298ee0cf8dad20521dd9febe94f1f99d93b0351b8c4a0106", 0x59}], 0x3, &(0x7f0000000700)}, 0x401}], 0x2, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000040)={0x5, 0x1, [0x5, 0x0, 0xac4, 0x4, 0x2], 0x6}) 15:34:59 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000540)=0x103) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0675ad002c00"]) clone(0x28080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, <r2=>0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x900) r4 = gettid() lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[]) ptrace$setopts(0x4206, r4, 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) r6 = syz_open_dev$vcsa(0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r5}, {r6}], 0x2, 0x0) dup2(r5, r6) syz_emit_ethernet(0x33, &(0x7f0000000300)={@dev={[], 0x10}, @broadcast, [{[{0x9100, 0x0, 0x8, 0x1}], {0x8100, 0x1f, 0x8cc5}}], {@mpls_mc={0x8848, {[{0x400, 0xe83, 0x10200000, 0x101}, {0x5, 0x7, 0x6, 0x94}], @llc={@snap={0x1, 0x1, "ab", "c6f31a", 0x12, "9b4c3dd206dd04440f07c5d361"}}}}}}, &(0x7f0000000340)={0x0, 0x2, [0x58c, 0xa27, 0x19f, 0xa8b]}) tkill(r4, 0x32) 15:34:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bpq0\x00', <r2=>0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000100)={@ipv4={[], [], @multicast2}, 0x50, r2}) r3 = dup3(r1, r1, 0x80000) preadv(r0, &(0x7f00000017c0), 0x0, 0x700) ioctl$TCFLSH(r1, 0x540b, 0x40) sendto$x25(r3, &(0x7f0000000140)="4409386d656a6b30d844b6e0e6a2783257b687c16717180fc581baf12e8b2bf5d8a1720441d98b4df978745b3f4b386de1682aaaf3049205fb8d2f466d1539163d6f40c41f129da9028314271dde51b5fece39f1e5ececaee4987c64f47cbe9f0af4758baa9b9576774aa65cf663b4059a37845951d182aa8626a860f5ce479a35d409ff0361cfd4ed29497c1e7f11c1bebeb0e16c4a159330e01e922c9f5e030b5b13", 0xa3, 0x8000, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) 15:34:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000400)=""/68, &(0x7f0000000540)=0x44) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, 0x0, &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x0, 0x0) fstat(r2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000780)={0x0, 0x16, 0x0, {0xfffffffffffffff7, 0x4, 0x757b7f5f, 0x0, 0x2, 0x2, 0xd, 0x3}}) accept$unix(r1, 0x0, &(0x7f0000000000)) 15:34:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) write$P9_RLCREATE(r0, &(0x7f0000000180)={0x18, 0xf, 0x2, {{0x10, 0x0, 0x3}, 0x8000}}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$caif_stream(0x25, 0x1, 0x2) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") gettid() 15:34:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000180), 0x4) close(r0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x4, 0x9, 0x4}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffb, 0xa1, 0x2, @buffer={0x0, 0xa, &(0x7f00000001c0)=""/10}, &(0x7f0000000200)="b96f155d2ce0f9aa861dc645b79de335f2c69c9166c067d7971da783b1736d25a83e803ca04545e368c0aa6f4974a67b46f2589e8a6a69e00a63fd6ef38a798821d5544126817001002e6b87a2ef535497cf29fbeaaa8eb50f43647443098e41a8d4fb94539c2e928c155a84bb4c585c76fdeafe3d88b75221985aa099397bdb6d4aed006ed3d6be7e2ade637372ba9974d66ed8e8217d070645faa38492207a2c", &(0x7f00000002c0)=""/97, 0x2, 0x34, 0x2, &(0x7f0000000340)}) 15:35:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffff7ffffff, &(0x7f00000001c0)="e24b84e223357a0bb31d2134c583584d39bac07a6d8eb812815c72b6aacbfaa18a204bc3ce3c09ceac140075ef80bcafc396866171d9144fa86348d7bfa820b7934324ecc37893375e6ad568ff820d2cf8ca1a6e278d657b426a17cd36acd40501766f1b22b3739d5e3da65efa2a11f1852b20d6649a269821a52a6ef37508178920aaf7") keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="8165772064656661756c7420757365723a6e6f64657620"], 0x1, 0x0) r1 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x0, 0x1, 0x9, 0x0, 0x7a0, 0x4004, 0xd, 0x8, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x8000, 0x2, 0xd847, 0x3, 0x6, 0x8, 0x8, 0x3fa3, 0x7, 0x9ae, 0x81, 0x6, 0x100000001, 0x59, 0x2bb, 0x0, 0x1, 0x730, 0x2cd9, 0x9, 0x0, 0xfffffffffffff800, 0x1f, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0x36}, 0x4000, 0x20, 0x6, 0x6, 0x5, 0xcf9, 0x6}, r1, 0xe, r2, 0xa) add_key(&(0x7f0000000300)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000340)="be91889f87302232a741e080e9f1bb26843bc9378f93db97bd8a9ca0bba7c83867866a257f591aafc73c0f4e09b2c730b99765c7ca14bbf828a90f437e6201cd63b825c59d80932ecdb4a864", 0x4c, 0xfffffffffffffffc) 15:35:00 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='\xbc\xf6', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000080)={0x43}) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2201000, &(0x7f00000000c0)) 15:35:00 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x141000, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1ba, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x40, 0x0) 15:35:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') r2 = semget(0x0, 0x3, 0x16) semtimedop(r2, &(0x7f0000000080)=[{0x2, 0x3}, {0x4, 0x55, 0x1000}, {0x3, 0xffffffff, 0x800}, {0x4, 0x2}], 0x4, &(0x7f00000000c0)) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 777.577431] kauditd_printk_skb: 185 callbacks suppressed [ 777.577439] audit: type=1400 audit(1556724900.509:16137): avc: denied { map } for pid=22630 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.762269] audit: type=1400 audit(1556724900.509:16138): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:00 executing program 4: clone(0x80807ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x11, 0x2) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@null=' \x00', 0x6, 'ip6_vti0\x00'}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f00000000c0)={0xa1}) 15:35:00 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @mss={0x2, 0x10000}, @timestamp], 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {}, {<r1=>0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x4}) ioctl$TCSBRKP(r0, 0x5425, 0x80000000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000180)={0x2, 0x8, 0x10001, 0x3, [], [], [], 0x3000000000000000, 0xfffffffffffffff8, 0x2, 0x0, "682a79d140b5cfc2a4a420df59e3bd23"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x2f, &(0x7f00000002c0)=0x2e9, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={<r2=>0x0}, &(0x7f0000000340)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, <r3=>0x0}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000003c0)={r0, r0, 0x7}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000004c0)={0xa, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000540)={0x0, 0xfff, 0x8, [], &(0x7f0000000500)=0x1}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000580)=[@mss={0x2, 0xd9}], 0x1) readv(r0, &(0x7f0000000a80)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/149, 0x95}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/27, 0x1b}, {&(0x7f0000000780)=""/234, 0xea}, {&(0x7f0000000880)=""/94, 0x5e}, {&(0x7f0000000900)=""/236, 0xec}, {&(0x7f0000000a00)=""/91, 0x5b}], 0x8) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000b00)=0x4, 0x4) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TIOCMBIS(r6, 0x5416, &(0x7f0000000b80)) connect$can_bcm(r6, &(0x7f0000000bc0), 0x10) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000c00)={0x10000004}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000c40)={0x9, 0x1457, 0x8, 0x2, 0x6, 0x8, 0xf20, 0x48, <r7=>0x0}, &(0x7f0000000c80)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000cc0)=r7, 0x4) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x34, r8, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10d610e2}]}, 0x34}}, 0x800) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e40)) [ 777.951538] audit: type=1400 audit(1556724900.509:16139): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x101) r0 = open(&(0x7f0000000600)='./control\x00', 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xfffffffffffffffe) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x0, 0x5) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x0, 0x0) [ 778.126238] audit: type=1400 audit(1556724900.539:16140): avc: denied { map } for pid=22632 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.149163] net_ratelimit: 20 callbacks suppressed [ 778.149169] protocol 88fb is buggy, dev hsr_slave_0 [ 778.149232] protocol 88fb is buggy, dev hsr_slave_1 15:35:01 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e21, 0x1, @ipv4={[], [], @local}, 0x3}, {0xa, 0x4e22, 0x100000000, @local, 0x80}, 0x0, [0x3, 0x200, 0x5, 0x7ff, 0xa2d, 0x3d9, 0x101, 0x4]}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x7fffffff, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') timer_create(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0x3, 0x10, 0x1, r3}) r4 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r4, 0x1000000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, 0x0}, 0x10) sendfile(0xffffffffffffffff, r4, &(0x7f00000000c0)=0xf10001, 0xeefffdef) write(0xffffffffffffffff, &(0x7f0000000240)="6213e62f11b7426b1a95c88641ac9243a5809b3224b2350c2d28457f6219e4b308d6283ab5847d6db73e5729a3782d63fdd80ec20b8d22e519afb4a124d607dee199a6bbaab6e0a12e24a64398655b910d3aded3b6223adcc2123b957981510d3b4894d2a4bd587f974bfe9bf80ad301badcbd329a05465bfd8df6fb8315aee82ff8b618b1edb444c80581937681dde08f152417303ed3140140b5e040111cf95674389176c285cdc64435300eb8e73b0f53e92a6844f37bdb1091dc8b9076a161199ba945d6dcbc7c6d7b", 0xcb) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000100)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000140)={0xffffffffffffffff, 0x865, 0x2, @random="f6f60931c6f3", 'vxcan1\x00'}) preadv(r1, &(0x7f00000017c0), 0x0, 0x702) tee(r1, r3, 0x100, 0x3) [ 778.308647] audit: type=1400 audit(1556724900.539:16141): avc: denied { map } for pid=22632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x117, 0xa}}, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000280), 0x8) syz_execute_func(&(0x7f0000000000)="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") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e23, 0x8, @rand_addr="91b86205ac8b7ccb44b9deb4681a7bf3", 0x400}, {0xa, 0x4e20, 0x100000001, @rand_addr="78134887b1934bb977aec47e35897162", 0x9}, 0x3f, [0xffff, 0xbd6, 0xff8, 0x8, 0x6, 0xf727, 0x7d9, 0xe000000000]}, 0x5c) [ 778.487048] audit: type=1400 audit(1556724900.549:16142): avc: denied { map } for pid=22631 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.526149] usb usb7: usbfs: process 22659 (syz-executor.4) did not claim interface 0 before use 15:35:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xfb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x448d425a2d3bd094) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000140)={0x5, @raw_data="23ec8dbc7548011e8eed5e555877ef0692bd6ba2b333b5fbd2492b75e5d6129c9a6570183f26deb9992db765e037879d343cb4d00559d68445fa79273cc36839b31543465d690107dddea10e895a2538277f2292705bfda05a4563c7212c0cb8961b2912a4ca3af2a0349abacf255f0faedb8556e6ff9ad95daa5338f0274fe2fdd37bd5991037ba21422c3609bcb26df3caef3577e80e0206f4865bcf566b26e068c69ad60bff49e713da04c635d584fdd12910570a285d90e52981a31b3de45ded5490f9d47566"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00', 0x800000000008a03}) socket$bt_bnep(0x1f, 0x3, 0x4) [ 778.625550] protocol 88fb is buggy, dev hsr_slave_0 [ 778.630746] protocol 88fb is buggy, dev hsr_slave_1 15:35:01 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @mss={0x2, 0x10000}, @timestamp], 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {}, {<r1=>0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x4}) ioctl$TCSBRKP(r0, 0x5425, 0x80000000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000180)={0x2, 0x8, 0x10001, 0x3, [], [], [], 0x3000000000000000, 0xfffffffffffffff8, 0x2, 0x0, "682a79d140b5cfc2a4a420df59e3bd23"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x2f, &(0x7f00000002c0)=0x2e9, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={<r2=>0x0}, &(0x7f0000000340)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, <r3=>0x0}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000003c0)={r0, r0, 0x7}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000004c0)={0xa, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000540)={0x0, 0xfff, 0x8, [], &(0x7f0000000500)=0x1}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000580)=[@mss={0x2, 0xd9}], 0x1) readv(r0, &(0x7f0000000a80)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/149, 0x95}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/27, 0x1b}, {&(0x7f0000000780)=""/234, 0xea}, {&(0x7f0000000880)=""/94, 0x5e}, {&(0x7f0000000900)=""/236, 0xec}, {&(0x7f0000000a00)=""/91, 0x5b}], 0x8) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000b00)=0x4, 0x4) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TIOCMBIS(r6, 0x5416, &(0x7f0000000b80)) connect$can_bcm(r6, &(0x7f0000000bc0), 0x10) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000c00)={0x10000004}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000c40)={0x9, 0x1457, 0x8, 0x2, 0x6, 0x8, 0xf20, 0x48, <r7=>0x0}, &(0x7f0000000c80)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000cc0)=r7, 0x4) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x34, r8, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10d610e2}]}, 0x34}}, 0x800) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e40)) [ 778.670785] audit: type=1400 audit(1556724900.559:16143): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x1) 15:35:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000080)="40f5259e31ead41a630804f367c4447b33"}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000380)=0x70, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff0d) [ 778.847736] audit: type=1400 audit(1556724900.559:16144): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.875558] protocol 88fb is buggy, dev hsr_slave_0 [ 778.880729] protocol 88fb is buggy, dev hsr_slave_1 [ 779.045525] audit: type=1400 audit(1556724900.579:16145): avc: denied { map } for pid=22631 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 779.117126] protocol 88fb is buggy, dev hsr_slave_0 [ 779.123626] protocol 88fb is buggy, dev hsr_slave_1 [ 779.190250] audit: type=1400 audit(1556724900.579:16146): avc: denied { map } for pid=22632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x200, 0x0) bind$netrom(r1, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x20000000, 0x3, 0x1ff, 0x2}) [ 779.265567] protocol 88fb is buggy, dev hsr_slave_0 [ 779.270763] protocol 88fb is buggy, dev hsr_slave_1 15:35:02 executing program 1: r0 = socket(0x11, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @bcast, @bcast, @netrom, @rose, @null, @netrom, @rose]}, &(0x7f0000000080)=0x48) setsockopt(r0, 0x107, 0x1, &(0x7f0000d52ff0)="010000000000060000071a80000001cc", 0x10) close(r0) [ 779.310464] 8021q: adding VLAN 0 to HW filter on device bond0 15:35:02 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000100)=0x10001) syz_init_net_socket$nfc_llcp(0x27, 0x7, 0x1) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000400), 0xffffffffffffffb1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800, 0x10000) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x2, 0x3ff, 0x80000000, 0x3}, {0x2, 0x1, 0x7, 0xfffffffffffffe01}, {0x100000001, 0x0, 0x12, 0x1}, {0x1, 0x1, 0x2, 0x7e28}]}, 0x10) 15:35:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = userfaultfd(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000180)="f410673c150a3ec0e3321c") r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x1, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000280)=0x1, 0x4) fcntl$notify(r2, 0x402, 0x80000004) getsockopt$netlink(r3, 0x10e, 0x3, &(0x7f0000000200)=""/24, &(0x7f0000000240)=0x18) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000000)="994a2ae92c10964c0f05bf03000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:35:02 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x8000000011, &(0x7f0000000000)="6eb137c9", 0x4) getsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000040)=""/221, &(0x7f0000000140)=0xdd) 15:35:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'nat\x00'}, &(0x7f00000001c0)=0x24) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:35:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={<r2=>0x0, 0x80000000, 0x30, 0x1f, 0x1}, &(0x7f00000000c0)=0x18) preadv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/218, 0xda}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6b, &(0x7f0000000680)={&(0x7f0000000000)=@ipv4_newroute={0x30, 0x18, 0xe01, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x8, 0x4, @rand_addr=0x75f}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) 15:35:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000300)=0x200000072, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) sendto$inet(r0, 0x0, 0xfffffffffffffda0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0xfffffc7e) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x400000000141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x10507e) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) renameat2(r2, &(0x7f00000001c0)='./bus\x00', r2, &(0x7f0000003bc0)='./bus\x00', 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x2004, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x40804) syz_genetlink_get_family_id$tipc2(&(0x7f0000003b80)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000003f80)={&(0x7f0000004bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xffffffffffffff5e) sendfile(r3, r4, 0x0, 0x80003) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') recvmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000340)=@generic, 0x80, &(0x7f0000002440)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/75, 0x4b}], 0x3}, 0xfffffffffffffff8}, {{&(0x7f0000002480)=@pppol2tpv3in6, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002500)=""/208, 0xd0}, {&(0x7f0000002600)=""/219, 0xdb}, {&(0x7f0000002700)=""/193, 0xc1}, {&(0x7f0000002800)=""/194, 0xc2}, {&(0x7f0000002900)=""/211, 0xd3}, {&(0x7f0000002a00)=""/134, 0x86}], 0x6, &(0x7f0000002b00)=""/4096, 0x1000}, 0x4}], 0x2, 0x0, &(0x7f0000003b40)={0x0, 0x989680}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@generic={0x0, 0xfffffffffffffffb, 0x6}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 15:35:03 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000540)) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000002340)=""/4096, 0x1000, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000340)=""/197, 0xc5}, {0x0}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=""/76, 0x4c}}, {{&(0x7f0000001b00)=@ax25={{}, [@default, @rose, @null, @netrom, @rose, @default, @netrom]}, 0x80, 0x0, 0x0, &(0x7f0000001d00)=""/229, 0xe5}}, {{&(0x7f0000001e00)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000020c0)=[{0x0}, {&(0x7f0000001f80)=""/241, 0xf1}, {&(0x7f0000002080)=""/50, 0x32}], 0x3}, 0x4}], 0x3, 0x40000000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x110, r0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 15:35:03 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) gettid() fcntl$getown(r0, 0x9) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=<r1=>0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r2 = syz_open_procfs(r1, &(0x7f0000000080)='smaps\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000891a, &(0x7f00000001c0)="0adc1f123c123f319bd070314dfe4746e9eb460835950ab6e8816ff1880665fe3af3edd44459670a386d54ba01b37b9cff08be0628bbb692273332aead9f832360c472c1937566713882b8989f31d10a7cc200fdecb471664621e71ab86228adb53d58234279439365b3f066cb247d573d8ece8688124b2853a06b917078a77443abebf582c19e83c4df6d6ca6051ea51988009a7162fa4b13820ba992a560c0aeb0741e0dd0f6fa07c8f6d7") sendfile(r0, r2, 0x0, 0x88008) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000040)=[0x8000000000]) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 15:35:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x2f, @local, 0x4e22, 0x3, 'sh\x00', 0x16, 0x74, 0x31}, 0x2c) 15:35:04 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000140)) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}, {0x0, 0x7530}}, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="9c35f03e6d72e4eac94f2506444b99cd861012fc305ac9b01da8648c93489310b6dee7c92993964a552715b15dc45edd0f8a32dea7bbb63a72", 0x39, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'sha224-avx2\x00'}}) 15:35:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c923f319bd070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cgroup.clone_children\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000100)="ae6591bf68a09105c3c377e89e94db5ec8ae54383a0155fcf1737ab016f6aa9bcb77f00bfdf1b032611d30132e2e1a619ae968e46e13d6de80b79ae76c8136acb2c3ef7609234e6feb8da4982a16026183b8820d8a47d7e3819dc954340e4703f63119fd19f9332b2ed1022ee3b4c0f7e7e2479db545f842") sendto$inet(r3, 0x0, 0x1fc, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_aout(r2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) socketpair(0x5, 0x0, 0x9, &(0x7f0000000080)) setsockopt$sock_int(r3, 0x1, 0x100000008, &(0x7f0000000040), 0x1f2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 15:35:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") fcntl$setflags(r1, 0x2, 0x1) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xb9, 0xc0000) ioctl(r0, 0x7, &(0x7f0000000180)="8f1f9c5852f6c766bc52ac78aaddf685e3a36b7767b95a408841de5680184765c26b63509938dcc039") syz_execute_func(&(0x7f0000000000)="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") fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, <r4=>0x0}) setgid(r4) setuid(r3) 15:35:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) open(0x0, 0x500, 0x4000000099) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') syz_execute_func(&(0x7f0000000080)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x0, 0x1, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000000)=0x7, 0x4) [ 781.347493] IPVS: set_ctl: invalid protocol: 47 172.20.20.170:20002 15:35:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') socket$inet6_sctp(0xa, 0x5, 0x84) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/111, 0xfffffffffffffff0}], 0x100000000000016c, 0x701) 15:35:04 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=<r0=>0x0) sched_setscheduler(r0, 0x6, &(0x7f0000000040)=0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) 15:35:05 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0xc3, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x0, 0x20000000, 0x0, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000100)=0x8, 0x8) 15:35:05 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") rt_sigprocmask(0x1, &(0x7f0000000180)={0x74}, &(0x7f00000001c0), 0x8) 15:35:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000ffffff00041fb80b80373d51ea0d928c9dd2fcf2006b69f965bc5491acefb9e30d38073b45546f792af1686dbf3e0dd6eb3abbedfa71c5c06ce068eea9b682128700d1b50f9c49bdf91014a6310f3db57b85c9d223482d5c9307c5da120e6e"], 0x14}}, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3ca25eafa7dd94438245812e359c3651d02bb4bf5ba4c2fb941ab34f31cb51f08dcef04cf46827d93c8397ad286f943caea808968d745849fed6f979e05f7763b6489a177c24e2d23fce31cd0ef29d54b09df5ff08918dd4d2da87bec6e44e53f4899757149d99d8ac538af2753430b0776175365bf5cbfdb04372214497a4f305d92942eee6b9a9fc84a83825f667a71de20200a9aa76233160a003ecc11891d685e6d7f6c7a03e7e638e7ea13af543", 0xb0, 0xfffffffffffffffd) r1 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000140), 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x8000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x0, 0x4) 15:35:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:05 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200800, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={<r2=>0x0, 0x6}, &(0x7f0000000180)=0x8) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x84001, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0x1}}, 0x4, 0x400, 0x7, 0x548c, 0x40}, 0x98) write$P9_RLCREATE(r3, &(0x7f00000002c0)={0x18, 0xf, 0x2, {{0x54, 0x4, 0x6}, 0xfff}}, 0x18) write$vnet(r1, &(0x7f00000005c0)={0x1, {&(0x7f00000004c0)=""/105, 0x69, &(0x7f0000000540)=""/70, 0x3, 0x1}}, 0x68) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000300)=""/83, &(0x7f0000000380)=0x53) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000003c0)=0x47c) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f0000000400)={0x4, "0307c44c8127ab3ef064aae6a289223598f723089b512f329755786642e0ea2c", 0x3, 0xfe, 0x9, 0x0, 0x4}) close(r0) r4 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trafs=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6fa573000000", @ANYRESHEX=r0, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={r2}, 0x8) 15:35:05 executing program 5: syz_execute_func(&(0x7f00000002c0)="985e4aa84a1c6d0f05f359bf21000000c4a37bf0c54041e2ebe2a2363e460f1a7000660ffc97660f6b32e51212b8c4014e4e4f751ec4016d7d14dec4a2513c06b921045fc507f240d1d2c4e10bf8c45bc4c66db712c483397fd300f7dcdc0fbcaf10009ec4c27d0a21ac6161c4c3214cb9a5605419c201b04b9700cff08171a30b8a826eefa80dd4d48cc7e8628f680864360fe258009e698de3c0f526264788fec4a1dd7dbbbfdd5cc6c46249bedc32a1c9fb1166470f383a4d4b") r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200040) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={<r1=>0x0, 0x8001, 0x8}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={r1, 0x10}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, r0, 0x0, 0x3, 0x306, 0xf91}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x4040000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x80000000, 0x1, 'client1\x00', 0x5, "7b8d75189b7e709e", "fb4f5bac686a5ee5eb46271cac3dcd653e452615a3439516ec491209cebc1bc3", 0x8000, 0x5}) [ 782.715991] kauditd_printk_skb: 219 callbacks suppressed [ 782.715999] audit: type=1400 audit(1556724905.649:16366): avc: denied { map } for pid=22784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 782.848602] audit: type=1400 audit(1556724905.679:16367): avc: denied { map } for pid=22784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffe93, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x4000000000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$SG_GET_PACK_ID(r1, 0x227c, 0x0) mount$9p_rdma(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1000008, &(0x7f0000000380)=ANY=[@ANYBLOB="87892c36e66c6b3c00e582c10507ff23a0f8ea4ce18e1c70f02ec17cab64c2e49a1ed2bf28d0d6d2e21ac51860ef2b72db01210ee93bfa7d0cad9142b1133fc2cab462d6ff8ad08df1bf5a315e8a8a8929abebee1107c6027c4b138a4188c103192922fa3daa7d15698e88d50d9967d94c57def92d6b15c612c714241b985334999542652af7059869eb9001b5f1a7c16ba05b10fe3164bf16"]) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000b80), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x158) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 15:35:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000000c0630000000000000f0000000000000000000000000000000000008ae959b1fe09000000f982b82ab416da9dc2c57aaf6db779d4e0400a6b91985edff3ba88090e62a61cb421ca113c4b5230fe2555d76d8f60bd9ea9c7fbe463fe15a68208586791b5f4def0ca7c0863174285c235d2dde8160ed5797558a9c87ca63091ddc21a3438108e304c3b87b4a216ae2c19835ebd7f14f02df8e9a3102ac34f7cdc8b640ed7142693e84c315d12e73e6888a7670c27d2c9fbdb9ed85176404c47af37825f528ece4dbf978ff8f5ded8dd27e923019783f978c3278098a60be8"]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x2000) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x402, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000280)=""/48, &(0x7f00000002c0)=0x30) [ 783.055740] audit: type=1400 audit(1556724905.689:16368): avc: denied { map } for pid=22784 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000002c0), 0x2) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) r3 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r2, r3) 15:35:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) syz_execute_func(&(0x7f00000003c0)="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") r1 = semget$private(0x0, 0x0, 0x8) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/190) [ 783.236711] audit: type=1400 audit(1556724905.699:16369): avc: denied { map } for pid=22784 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.265568] net_ratelimit: 20 callbacks suppressed [ 783.265574] protocol 88fb is buggy, dev hsr_slave_0 [ 783.275743] protocol 88fb is buggy, dev hsr_slave_1 15:35:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket(0x2, 0xe, 0x3) sendto$unix(r1, 0x0, 0x8a, 0x0, &(0x7f0000000140)=@abs, 0x6e) mmap(&(0x7f000084e000/0x3000)=nil, 0x3000, 0x40000003, 0x32, r1, 0x2) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) [ 783.392724] audit: type=1400 audit(1556724905.729:16370): avc: denied { map } for pid=22784 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.425556] protocol 88fb is buggy, dev hsr_slave_0 [ 783.430716] protocol 88fb is buggy, dev hsr_slave_1 [ 783.505534] protocol 88fb is buggy, dev hsr_slave_0 [ 783.510699] protocol 88fb is buggy, dev hsr_slave_1 15:35:06 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x200, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0xc5, @mcast2, 0x8761}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000200)="caab49371af9e992bc5508208d61e8bd3a796b46448a02cf38fb06898c48da70b558535a5c611d75fe4f8b3d9645e7034cdb435007") [ 783.640050] audit: type=1400 audit(1556724905.759:16371): avc: denied { map } for pid=22784 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/rt_cache\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={<r2=>0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x4, 0x7, "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", 0x74, 0x2, 0x5af8e76b, 0x100, 0xc2a, 0xffffffff, 0x5, 0x1}, r2}}, 0x120) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pause() r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={<r4=>0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) connect(r3, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x1, 0x4, 0x1, 0x3}}, 0x80) syz_execute_func(&(0x7f0000000c80)="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") [ 783.736278] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.752670] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.759830] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.780433] audit: audit_lost=181 audit_rate_limit=0 audit_backlog_limit=64 15:35:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffff2e, 0x0, 0x0, 0x0, 0xd2822aedb9ecee63}}], 0x38f, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x4, 0x8000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2801010000005fba080000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) socket$netlink(0x10, 0x3, 0x6) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 15:35:07 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x204400, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000480)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x3}}, 0x18) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000440)={r0, 0x0, 0xffffffff00000000, 0x0, 0x3}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000400)=0x1) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000140)}) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ff3997ffcd00aaaaaaaaaa00080045000058000000000088907808000000ffffffff0420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000009ab148d2d6521fcd3f5544cde53892ee12dc6378b13cf1b676e3a3d459f0f1491e04f0246b8749f9afc340afb96b17087f5a2c5ef6930504495ae399f63669dde19695c5ed6a191600b35af4f8d80f063385b57f12cc455eb02ceae78520355836c22298320d942b1a266f7ff5fff18ebb0c"], 0x0) 15:35:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r5 = geteuid() ioctl$TUNSETOWNER(r4, 0x400454cc, r5) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x30, r3, 0x1, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_hsr\x00'}}]}]}, 0x30}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r6 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r6, 0xc1004110, &(0x7f0000000000)) [ 784.385573] protocol 88fb is buggy, dev hsr_slave_0 [ 784.390750] protocol 88fb is buggy, dev hsr_slave_1 15:35:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0x5, "4a7efd108821dc948b717236aee2"}, 0x10, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 784.620916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22841 comm=syz-executor.4 [ 784.720341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22841 comm=syz-executor.4 [ 784.818496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22844 comm=syz-executor.4 15:35:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0xfdb, 0x4) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000200007041dfffd946f6105000200000a1f000003002808000800030004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 784.861700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22851 comm=syz-executor.4 [ 784.874107] protocol 88fb is buggy, dev hsr_slave_0 [ 784.874165] protocol 88fb is buggy, dev hsr_slave_1 15:35:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)={@local, @remote, 0x1, 0x6, [@rand_addr=0x7ff, @multicast1, @empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, 0x28) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x1) 15:35:08 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x80000, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x2c) write$eventfd(r0, &(0x7f0000000180)=0x5, 0x8) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") [ 785.371985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 785.568747] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 787.355923] IPVS: ftp: loaded support on port[0] = 21 [ 787.480133] chnl_net:caif_netlink_parms(): no params data found [ 787.562766] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.569501] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.576692] device bridge_slave_0 entered promiscuous mode [ 787.585202] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.591771] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.599106] device bridge_slave_1 entered promiscuous mode [ 787.622666] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 787.634055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 787.658908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 787.666497] team0: Port device team_slave_0 added [ 787.673796] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 787.681163] team0: Port device team_slave_1 added [ 787.687438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 787.695794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 787.720710] device hsr_slave_0 entered promiscuous mode [ 787.726551] device hsr_slave_1 entered promiscuous mode [ 787.733404] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 787.741926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 787.770679] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.777078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 787.783710] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.790516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 787.872052] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 787.888978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 787.904293] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 787.919342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 787.926651] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.944411] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.957999] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 787.964095] 8021q: adding VLAN 0 to HW filter on device team0 [ 787.977842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 787.985872] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.992233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.005047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 788.014869] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.021335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.051805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 788.060177] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 788.073591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 788.087349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 788.101501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 788.116309] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 788.122410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 788.148292] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 788.169818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 788.187550] kauditd_printk_skb: 238 callbacks suppressed [ 788.187559] audit: type=1400 audit(1556724911.119:16599): avc: denied { map } for pid=22884 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.216139] audit: type=1400 audit(1556724911.119:16600): avc: denied { map } for pid=22884 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.239965] audit: type=1400 audit(1556724911.119:16601): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.264354] audit: type=1400 audit(1556724911.119:16602): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.290574] audit: type=1400 audit(1556724911.129:16603): avc: denied { map } for pid=22884 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.317746] audit: type=1400 audit(1556724911.139:16604): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.342790] audit: type=1400 audit(1556724911.139:16605): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.345543] net_ratelimit: 22 callbacks suppressed [ 788.345548] protocol 88fb is buggy, dev hsr_slave_0 [ 788.369195] audit: type=1400 audit(1556724911.149:16606): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.372630] protocol 88fb is buggy, dev hsr_slave_1 [ 788.378073] audit: type=1400 audit(1556724911.159:16607): avc: denied { map } for pid=22884 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.433361] audit: type=1400 audit(1556724911.199:16608): avc: denied { map } for pid=22885 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.470667] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 788.506072] protocol 88fb is buggy, dev hsr_slave_0 [ 788.511175] protocol 88fb is buggy, dev hsr_slave_1 [ 788.545588] protocol 88fb is buggy, dev hsr_slave_0 [ 788.550737] protocol 88fb is buggy, dev hsr_slave_1 [ 788.625603] protocol 88fb is buggy, dev hsr_slave_0 [ 788.630690] protocol 88fb is buggy, dev hsr_slave_1 15:35:11 executing program 1: mknod(0x0, 0x40000000, 0x26b) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) rt_sigpending(&(0x7f0000000100), 0x8) timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r2, 0x1000000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, 0x0}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) setrlimit(0x6, &(0x7f0000000040)={0x80000000000000, 0xbf28}) sendto$rxrpc(r1, &(0x7f0000000140)="012b6a78623810ffb78e67232c707d9e01e5af23da0d08e233fcfdfc43895db3f877dc7560b1fa9a13f0fa7d982a051b13b7d1d2c13c89c892f7cc59e2cd4edb6b9c6947eacf47ab53d1de64803ff29c094d40d3da905d118319b4fa9c15c2a4cc889d9dc82aa77c23", 0x69, 0x800, 0x0, 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeefffdef) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x2, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) write(r3, &(0x7f0000000240), 0x0) 15:35:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x20040, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={<r3=>0x0}, &(0x7f0000000740)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000840)={[], 0xa0, 0xbf3, 0x1d08000000, 0x2, 0x3, r3}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000780)={0x4, 0x2}) ioctl(r1, 0x1000008912, &(0x7f0000000440)="0adc1f123c123f13a592b9319bd070") sendmmsg$inet_sctp(r0, &(0x7f0000000700), 0x0, 0x10) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000007c0), &(0x7f0000000800)=0xffffffffffffffa8) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000400)={0x10000}, 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'filter\x00', 0x0, 0x4, 0x55, [], 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/85}, &(0x7f00000003c0)=0x78) 15:35:11 executing program 4: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x1, 0x81}]}, 0xc, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0xfc) 15:35:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x30b, 0x700) ioctl(r1, 0x80000001, &(0x7f0000000080)="126be93d75547004fa5e512b261caffc0b09bdf076707cf89240288048666442b271f058838fda26010e5b440c50b6336aecc83308ed0110372c06b2b6fd65aa0643fe153d5be11f794ce0f33274cb74d518bfd9532a60d86fd31a921fcc395fb6a9793f319ee88bf420fcf61d4ea82bde6c5afa633c0a6cdb9fe0bb5fd9cb32e46fbfb9537006753b101d5ce40fa777a700e968d88e0dbad16f9111c6f3a63f5c15177c5c874311f228a614210c5dada5fc8cf0f7628e50129b30a3a58cc3b9ba6bfddd79de78a4410005096587ae9d46faf87311") 15:35:11 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) r1 = dup(r0) accept$alg(r1, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3ac257a822c711b4, 0x0) 15:35:11 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000300)='hfsplus\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x8, 0x200000) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000140)={0x6, @win={{0x1, 0x7, 0x7fff, 0x10000}, 0x7, 0x8000, &(0x7f00000000c0)={{0x5, 0x374, 0x7, 0x6}, &(0x7f0000000080)={{0x298e, 0x3, 0x1, 0x100000000}, &(0x7f0000000040)={{0x0, 0x6, 0x7, 0x9d}}}}, 0xffffffff7fffffff, &(0x7f0000000100)="58dbe7f68377df44d1bd85e91091f9", 0x7ff}}) 15:35:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000180)={0x7, 0xf3, 0x6c24, 0xc5f}) syz_execute_func(&(0x7f0000000000)="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") 15:35:11 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x101000) ioctl$TIOCSIG(r0, 0x40045436, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000300)={{0x2, @addr=0x100000000}, 0x8, 0x7, 0x7}) ptrace$cont(0x1f, r1, 0x11, 0x0) write$9p(r0, &(0x7f0000000340)="247b74aa7b", 0x5) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x8, 0x100}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)="f38231ce664b104cd37d0c79b640aa000ab74ef0fb9da5a61cf2f371a8a6f9e6389f8969e6ab18a68d3bd0342413f08a811f67fb987383d29341eb76136e3d7f998343c9") ptrace$cont(0x9, r1, 0x0, 0x0) [ 789.026005] protocol 88fb is buggy, dev hsr_slave_0 [ 789.031135] protocol 88fb is buggy, dev hsr_slave_1 15:35:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x4}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:35:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) wait4(r1, 0x0, 0x8000000a, 0x0) sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) 15:35:12 executing program 5: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2081) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x16, @broadcast, 0x4e22, 0x2, 'sh\x00', 0x28, 0x4b, 0x62}, 0x2c) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) getpgid(0xffffffffffffffff) 15:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x5, 0x80004) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x72) ioctl$KVM_SMI(r1, 0xaeb7) 15:35:12 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x2000, 0xd03, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)=""/40, &(0x7f0000001000)=0x28) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x400, 0x12, 0x14, 0x15, "634e9ffb2c54c80c7dc286acc733e6a42e504ca77687c9b5122f31c8c31f6f3b1f752d3601d7ad96532a4c38b9babc654d18fabae961403c905b842da114c1cd", "32942b5c0d3b4489329621800be103e561046f9e544539cdd38c523ca8147790", [0x80000000, 0x5]}) shmget(0x1, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) mkdir(&(0x7f0000000280)='./file0\x00', 0x49) 15:35:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x88}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1a0, r2, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x923a}]}, @TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x707e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xae}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8b33}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}]}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x11d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}]}, 0x1a0}}, 0x2004c000) 15:35:13 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10, 0x800) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) setpriority(0x0, r1, 0x10000) mount(&(0x7f0000000800)=ANY=[@ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) readlink(0x0, &(0x7f00000008c0)=""/16, 0x10) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x1001, &(0x7f0000000000), 0x2}) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000200)) write$selinux_attr(r2, &(0x7f00000000c0)='system_u:object_r:tpm_device_t:s0\x00', 0x22) sendmsg(0xffffffffffffffff, 0x0, 0x800) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000004c0)='/\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='security.capability\xf6', &(0x7f0000000440)='security.capability\x00'], &(0x7f0000000ac0)) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@rand_addr=0x8001, @dev={0xac, 0x14, 0x14, 0x2a}, 0x0, 0x1, [@remote]}, 0x14) ioctl$void(0xffffffffffffffff, 0xc0045878) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x9, 0x0, 0x0, 0x10000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) r3 = add_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000680)="217af4ad7400a9285c524a88f4054e5dd3bb59dcb36bf56bc54bf5e34b895e280b37913bb43e9a29fe2f644c20537c2717f90d1c472ab2aef1556b92ab2bb8d09a800c961ace28c93568ce773b90bf35e3c64f6302c9dbb6b6dd8e952105cf99588f8f90faaaa4c1ccc08512975f1d91273d3fe430d84b6ff22b3e5d6ffe75cb39f97b23c8967f97ab883a27cd3ef03310ea667bd5cda5dd39d02ec574773e172df69d3e834c02392c2529cdf24c3c86bde0491a9df4006aebad1cacfdd7920b354e9632c5fb0fd62256812f9e22e52ec07675a58cf303f03b0d6009a070a760188367d870", 0xe5, 0xffffffffffffffff) keyctl$set_timeout(0xf, r3, 0xe2) 15:35:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x168, r2, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4728}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe012}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @loopback, 0x6}}}}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x8000}, 0x4040010) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) 15:35:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x20102, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000500)={0x7, <r2=>0x0, 0x3, 0xe8}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000540)={r2, 0xff}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) r3 = accept4(r0, 0x0, &(0x7f0000000300), 0x800) accept$ax25(r3, 0x0, &(0x7f0000000480)) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000180)={<r5=>0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f00000002c0)={r5, 0x9, &(0x7f00000001c0)=[0x3f, 0x40, 0x8, 0x100000000, 0x7, 0x9, 0x5, 0xf0a7, 0x6], &(0x7f0000000200)=[0x10000, 0x100000001, 0x9], 0x10, 0x4, 0x1, &(0x7f0000000240)=[0x400, 0x9, 0x7, 0x7], &(0x7f0000000280)=[0x4]}) syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x80000000) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000080)="f55d821e179ba1188e6d30377d3c3138eed9fe2b76c9e50071aa27c1140b30502825526330fb062a19caca3c54af84dd07b577313a813b36c76c524985b5d3e1742e9bf16201dfb0166be94ee1039884ad3b899b6e96055c817cb243bbe89cf30543172b90ae09d8daefb8d4ec7056004b3ee9c6d4dfb88206ad19a1f839ddca1a0463ad742a04d0d59e0354ab0d61527c8c88d4ba8593") preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) 15:35:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8, 0x2, 0x4, 0x2, 0x6, 0x7, 0xfffffffffffffff8}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x6, 0x31, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xb84, 0x1}, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, 0x100, 0x200}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x7a}}, 0x10) keyctl$session_to_parent(0x12) ioctl$SIOCGSTAMPNS(r1, 0x8903, &(0x7f0000001280)) 15:35:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x4920, 0x0) listen(r0, 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) io_setup(0x0, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xffffffffffffffd5, 0x101}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={<r3=>0x0, @in={{0x2, 0x4e23, @multicast2}}, 0xfffffffffffffffc, 0x3f, 0x5, 0x7f, 0x8}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, 0x4) prctl$PR_SVE_GET_VL(0x33, 0x10e0f) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000340), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x80000001, 0x0, 0x0, 0x1000000000054}, 0x98) [ 790.923798] IPVS: ftp: loaded support on port[0] = 21 15:35:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) uselib(&(0x7f0000000080)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:14 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x100000000) ioctl$int_in(r0, 0x8000008004500b, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) 15:35:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f00000001c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000180)={0x0, {0x400000000000000, 0x3}}) 15:35:14 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'tunl0\x00'}}) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000140)=0xd5) 15:35:14 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x2000, 0xd03, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)=""/40, &(0x7f0000001000)=0x28) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x400, 0x12, 0x14, 0x15, "634e9ffb2c54c80c7dc286acc733e6a42e504ca77687c9b5122f31c8c31f6f3b1f752d3601d7ad96532a4c38b9babc654d18fabae961403c905b842da114c1cd", "32942b5c0d3b4489329621800be103e561046f9e544539cdd38c523ca8147790", [0x80000000, 0x5]}) shmget(0x1, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) mkdir(&(0x7f0000000280)='./file0\x00', 0x49) 15:35:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) 15:35:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x0, 0x5, 0x7) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0)=0x1, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="1c09c4637916d7b098cd801b69e4c4c2319cbe998999996962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427fc902023ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b304545e269a841000f9945332faee4eef5f50f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00003c66660f3a0b0865") [ 793.385147] kauditd_printk_skb: 262 callbacks suppressed [ 793.385155] audit: type=1400 audit(1556724916.309:16871): avc: denied { map } for pid=23021 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.425578] net_ratelimit: 28 callbacks suppressed [ 793.425585] protocol 88fb is buggy, dev hsr_slave_0 [ 793.435689] protocol 88fb is buggy, dev hsr_slave_1 [ 793.525560] audit: type=1400 audit(1556724916.379:16872): avc: denied { map } for pid=23021 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.645898] audit: type=1400 audit(1556724916.389:16873): avc: denied { map } for pid=23021 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.665562] protocol 88fb is buggy, dev hsr_slave_0 [ 793.675320] protocol 88fb is buggy, dev hsr_slave_1 [ 793.755896] audit: type=1400 audit(1556724916.399:16874): avc: denied { map } for pid=23021 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.815522] audit: type=1400 audit(1556724916.419:16875): avc: denied { map } for pid=23022 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.840336] protocol 88fb is buggy, dev hsr_slave_0 [ 793.840392] protocol 88fb is buggy, dev hsr_slave_1 [ 793.905546] protocol 88fb is buggy, dev hsr_slave_0 [ 793.910679] protocol 88fb is buggy, dev hsr_slave_1 [ 793.955896] audit: type=1400 audit(1556724916.429:16876): avc: denied { map } for pid=23022 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.055524] audit: type=1400 audit(1556724916.429:16877): avc: denied { map } for pid=23021 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.135551] audit: type=1400 audit(1556724916.449:16878): avc: denied { map } for pid=23022 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.199501] audit: type=1400 audit(1556724916.459:16879): avc: denied { map } for pid=23022 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.244407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 794.785546] protocol 88fb is buggy, dev hsr_slave_0 [ 794.790692] protocol 88fb is buggy, dev hsr_slave_1 15:35:17 executing program 2: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f00000002c0)={0x20080522, r0}, &(0x7f0000000240)) bpf$PROG_LOAD(0x9, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x854f, 0x40) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)=0x2) 15:35:17 executing program 4: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2b, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xe006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x6, 0x0) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:dlm_control_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xfffffffffffffff9, 0x20, './file0\x00'}, 0x56) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)='\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd') close(r5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r4, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r5) 15:35:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth0_to_hsr\x00', &(0x7f0000000040)=@ethtool_rxfh_indir={0x38}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='/selinux/user\x00', 0xe, 0x3) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) 15:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ipx, 0x7e, 0x0, 0x10e}}], 0x2a2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x42840000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="09002abd7000fedbdf25140000009000010044000400200001000a004e2100000058fe8000000000000000000000000000aaaf010000200002000a004e210000000600000000000000000000000000000001ad0600000c0001006574683a6e7230003c0002000800020001800000080003000700000008000200060000000800030000000000080001001c000000080001001800000008000300010000001c00020008000200010100000800020001000000040004000400040034aadf94714294e2fd9247e93f99d65d11fd7179eec2806676981b964d10673feec63a3cf8f438974557d29cc6352856276fed76edad59343bd731d6ba871e108ce01a9120f765f7356a23b72444f7b06e4a0746ed1fb8fb046aeab46b084d9fa036e96d9d8b81e5854f2eae8db4683323752722a13552725b9a6094f7bd6bf85e9f24179e497182989be7c5681ab4f7603843a2b1"], 0xc0}}, 0x20000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') bind$tipc(r3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000480)={0x6, 0x0, 0x7ff, 0x4, 'syz0\x00', 0x3}) ioctl$TCXONC(r3, 0x540a, 0x79f) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000100)=""/237, &(0x7f0000000200)=0xed) 15:35:17 executing program 3: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:35:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x81, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={<r1=>0x0, @in={{0x2, 0x4e24, @rand_addr=0xff}}, 0x401, 0x3}, &(0x7f0000000100)=0x90) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001300)={r2, &(0x7f0000000200)="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", &(0x7f0000001200)=""/241}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) 15:35:18 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000400)=0x8, &(0x7f0000000440)=0x4) ioctl$int_in(r1, 0x800000c0045005, &(0x7f00000004c0)=0x100040000) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x16, @remote, 0x4e23, 0x1, 'lc\x00', 0x10, 0xf962}, {@multicast2, 0x4e21, 0x0, 0x6154, 0x7, 0x80000001}}, 0x44) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @multicast2}, 0x14, 0x0, 0x0, 0x0, 0x7b, &(0x7f0000000300)='batadv0\x00', 0x7, 0x100, 0x5d10}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r2 = fcntl$dupfd(0xffffffffffffffff, 0x404, 0xffffffffffffffff) r3 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000000040)={0x0, 0x0, [0x3, 0x0, 0x100000000, 0x0, 0x5, 0x0, 0xb7]}) recvmsg(r0, &(0x7f0000000780)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/78, 0x4e}], 0x1, &(0x7f0000000680)=""/207, 0xcf}, 0x2000) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="0e7ed675a61a4426bc49b7b25e10dade8d0f630222a47d58c29dffc4ce1cdf91218a1aef3bb6025d68b982f1e73b5f453930e2e34455d923c7149079650722f777", 0x41, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, r4) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000240)=0x5) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) 15:35:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40380, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=<r3=>0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=<r5=>0x0) r6 = getpgrp(0xffffffffffffffff) fstat(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, <r7=>0x0}) getgroups(0x6, &(0x7f0000002d00)=[0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0xee00, <r8=>0xffffffffffffffff]) r9 = getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002d40)={0x0, <r10=>0x0}, &(0x7f0000002d80)=0xc) r11 = getegid() sendmsg$netlink(r2, &(0x7f0000002e40)={&(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4004}, 0xc, &(0x7f0000002c40)=[{&(0x7f0000000400)={0x281c, 0x36, 0x800, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x12f0, 0x66, [@generic="99f7b0d3957feca290b3bb62cf379f94547968e42a7d4592f0073d58efe3afa49e44562d26b9716235f636c5c8471f79853b73791173799c18d2d07ddf3c0d64d4507c31f12fe41e94f938569d2b20797c4ca9ab7b83e1af7fdc1a2f5c156daa2504aa7331a412c59afc98ef6667680abcb726664e3ec181e876e69d83891af02c2d9a6e61df21464df477c5c7d28e69a55956e0ac4aff1f6012a97429af0a30b9f89a3212bd2ab0f22787b90cfe1b8571b354ae9583baac76abf5c097f93b6654268829751d5335", @typed={0xa8, 0x89, @binary="6cae3fae6b31baea728e81714cf57334fb2a6de6c763e1b62521393083d46801a3a635ee3e85bb3313f17a2957cc730d80a089fac0150cd3a114c6bdb8840f0f69b13556a0f9e51f228327b8d810bd809e7e25578cdec7ce9756938683e378bca206e81e5681f364d39b70472c3025526474c959809627631de1ec4da9a61e15e0f7d439ddfde3c05f92139bead4f4f65d10f15919f4f300bcf7ab7bfe33ef86e5"}, @generic="ef21753e8f87d81dca0b4c28336ec5c4e6145b666494efdbe82bca6a9b235b360754e9243c4aa3e26aff897d029b250402aa0a2d3745dcd6dc2813183c1e091fa049cbb196bd69537db8156b02db492a3b79186df69b697a95b823dc917ad7eff147c9049c9769", @generic="6914eea5a7d43129cf1c7b9143f4aacf2fe174c8efef5f4561da13d03411e2045a729be3d5f1824185a730903e3c9207300f5ad5e2fe341776c617511ec11b53e478acb9ba5b9493980059d2ca8752c254bcfee361a6d9e044e2e4ba5fe0f9858ffd17f26c1afa9765de85a14b39cb02653da7d86dc964cd636c1a80fcdb16439ecee97576c1db6eb19f232fc9b3303f4d5cda878d37ec0afc3058acdb5a1f9d7745b30bc0a6ca2417ab0457cef7964f46bfa145e23f61fee6", @generic="d1fd3fbd7c469b8d533f549c4e227bda76c35ce74b33297e1f07b38286255c935a4a81012dbe8b6dc31ce43b4563a0fd25d25e3a6f3cd251190aac24efff0a7a24846b", @generic="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", @typed={0x8, 0x86, @fd=r1}, @typed={0x4, 0x47}, @typed={0xc, 0xf, @u64=0x7fffffff}]}, @generic="80f676604fccd216bec2890f93f0ed87b08a6bffea7acc14050cd502e09e3c8a26db3195168eaf00804e7646f4844db7075c60e88ee7911a67260770189246d7da126f3f3ac20adc6f6272e99bc6b57cc670e2b8fa52cb0fecce7db1a27198fd5ddcaf8443c4c7c097b89294adbf8fb0af4de37abcf977a3203666a49213961ea19beaa6627fe25305db4045408984c5192c21e334f1fe2f4f1824c11a2c76845f716c74fc70326baa8712c15d5a2636dad9d8014bd42ad86aa7", @generic="9ae5b57bead3f84ce8948d50d09a2d4ed16b1aa7bc6a4d83a1b5dde36908a6d255a8642bffb64880db2015bdceba5741acd6a70c3299874bad03bec8a589bd8f31384143e1e539627b18852b161d3d59b5eb104d4c239c5f1874a04ad93b050023f0f9176f071b35ca51b1ad5d541525891df7b515a61685cc5b7a35438ea2ab914f11afe8cfe379338d0424a355123b3df8630463ad2cb81c75e4d474ac21bdc7e38be462edbe7ef7304d9022d0b1eed8b3decc9a54a8699de5acee0cb9434db9f837fdb8a956fefa6c5b370993e133d40ef6405abcd6667b315cd73b38f9db7a", @nested={0xdc, 0x2b, [@generic="282389e5288628ea5638147c967a1f137ace157ab5198bb4e7aaab49e302c8091b64e437ef23651eb64c1e6ad393", @generic="6f1ac607dad50a980f60ca4c4c70fd598c7c42bf78f35521d5a8dba3fdb0b7c11c097496b2dac9a02edd3d0666ca865103c75613", @typed={0x4, 0x94}, @typed={0x8, 0x90, @pid=r3}, @generic="37b4d28328576a1faa7365e94e62a9d8a753d42dbe6c888218d4982f74288f2c0c32cfe7c4e7e4c4f7c2bcf7795a7ac3fcf98b3234a65d844011ab4e93164f61d7384b0b35596624b1502a62dabafe306a37199d66fb6452adc89b7000945ea1373e9015d4813e79ac"]}, @typed={0x8, 0x93, @uid=r4}, @typed={0x8, 0x88, @pid=r5}, @nested={0x1290, 0x5f, [@generic="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", @typed={0xec, 0x7f, @binary="9fc1af8d89b391710ce8aa1d0a6f0ee52472fca6fbf08e6d0b38a993751fe9066ec6e21064fd1a43d5270f8c5b312911fbd849c6ae6f35d8393e4e09c0d2bc343e0f6ef1e976aad9dd18014b940435eb5115a0a979bc1ba5d601daadf9477b530021d5973f8ae5f41b8c905d2158506d55ee0ba4af3fcc27d15c60d67ef1bfac466af9031943f3a400c77360ce78cf2dda9d019db9e62796112b3a7a948af9514cf956ea5df9e2f7a09fad4c8eb90c64f28b53b86e0d408bd379933377c9ef9eba59c694186a0abb5efd2688f3e9025d8fd3d336e4232caa45ca2eef10675c7cc691813ce1e81a9a"}, @generic="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", @generic="7c7e24c0dced9e9dee39caa957ee38e4621fcb95eaeacaa229f83d1e3f6be00a2343ccb1cd09ff2af8186b0e386202c51744779ae429f76f06fb3c35ff9b51ae64bdc5f867e9e0f494df135f41d0bb4da8f90a386c1a1e2f69f309fd1d0793976329b1171008584e2eb37471100ac84f23f3c2e0642b95ccc171a09b110869c0d168654620bf9084c6", @generic="bad4920146613446a168a66d38c5fe8cb0f7788d08c67abc6db9b24d"]}, @typed={0x4, 0x96}]}, 0x281c}], 0x1, &(0x7f0000002dc0)=[@rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r1, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x70, 0x4000}, 0x8000) 15:35:18 executing program 0: mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x88040, &(0x7f0000000480)={'trans=unix,', {[{@cache_none='cache=none'}, {@nodevmap='nodevmap'}], [{@obj_role={'obj_role', 0x3d, '!keyring'}}, {@smackfsroot={'smackfsroot', 0x3d, 'cpuset$vboxnet1keyringmime_type'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname', 0x3d, '\\'}}, {@fsname={'fsname', 0x3d, 'net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02'}}, {@obj_role={'obj_role', 0x3d, 'net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02'}}]}}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:18 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000480)={'syz'}, &(0x7f00000004c0)="ac0150827f100f1726ff030ee7cc88b38814bec137cd2fa30787753877db4a473ec1b89847c9ab204b6043b43f4422b5e01c17c74a0d04ddded04965b8fcded3c34c4a8c8861e9aa6122fe4925e559ffa432002375b2d6ea7fbd3a8c960636b9980bbbf4c7abea3e8898f338dc5ca43c405edc31d3014ba29a", 0x79, 0xfffffffffffffffd) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000540)={[{0xffff, 0x4, 0x6, 0xffff, 0x10001, 0x8, 0x8, 0x1000, 0x401, 0x4, 0xffffffff, 0x5, 0x10001}, {0xff, 0xffffffffffff1e7c, 0x3, 0x5, 0x3, 0x9, 0x6, 0x5, 0xad, 0x5c, 0x0, 0x6e88, 0x81}, {0x8, 0xfffffffffffffffb, 0x8, 0x1, 0x9, 0x3ff, 0x0, 0x3ff, 0x6, 0xe2e, 0x375, 0xfff, 0x9}], 0x5}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffe, 0x72, 0x0, @buffer={0x0, 0xa, &(0x7f0000000100)=""/10}, &(0x7f0000000140)="e5cc3f6e434891da9a9d1ee5d34b1a7baaaffe3cd086eb9e2fef56e0a4e6117243ae2a4321370ab35634c9962336e56e789af2d8e5dda2a0a499e5afc7985ae442eb7c2a48a3b90c439bf8014c66f69b2189fd3965d27a34747499293cfbf3f811fa6faac1bcba511f5e2eff994701f0ebe1", &(0x7f00000001c0)=""/23, 0x0, 0x10020, 0x2, &(0x7f0000000240)}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 15:35:18 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0xa0002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:35:18 executing program 5: lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, <r0=>0x0}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@discard_size={'discard'}}, {@grpquota='grpquota'}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_lt={'uid<', r0}}, {@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'discard'}}, {@fowner_lt={'fowner<', r0}}, {@obj_type={'obj_type', 0x3d, '/'}}, {@measure='measure'}, {@measure='measure'}]}) getresuid(0x0, &(0x7f00000001c0)=<r3=>0x0, &(0x7f0000000200)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="447bbca8ba83beac8479431d60c33dcc6b84e6878642d93221592b46967993acd660c466a686161bf4485b6a9cb5a34ee461a52ec5e288b69304ff7602c26e4b8601eb7e191551af3f2d2dc81537fccd7d349558720f6e2ccc4e34425ecb6d209139b44c9b5ad57b1be5411a6cc983d24d5aedcd686a", 0x76, 0x540a}], 0x40082, &(0x7f0000000240)={[{@creator={'creator', 0x3d, "25921495"}}, {@codepage={'codepage', 0x3d, 'cp865'}}, {@session={'session', 0x3d, 0x7}}, {@uid={'uid', 0x3d, r3}}, {@umask={'umask', 0x3d, 0x40}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000500)={0x1, 0x5, 0x465, 0xdd, 'syz0\x00', 0x1}) 15:35:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x200000) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/151, 0x97, 0x9, 0xffffffff, 0x9, 0x3, 0xffff}, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = shmget$private(0x0, 0x2000, 0x500, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:35:19 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', <r3=>0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', <r4=>0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000500)={@dev, <r5=>0x0}, &(0x7f0000000540)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000780)={@dev, <r7=>0x0}, &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00', <r9=>0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000d80)=0xe8) accept$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, <r12=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000e40)={'vcan0\x00', <r13=>0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'vcan0\x00', <r14=>0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f40)={0x11, 0x0, <r15=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, <r16=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005900)=0x92) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005940)={'team0\x00', <r17=>0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005a40)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r18=>0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000005b40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005b80)={0x11, 0x0, <r19=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005c00)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r20=>0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000005d00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007140)={0x11, 0x0, <r21=>0x0}, &(0x7f0000007180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000f0c0)=[{{&(0x7f00000071c0)=@nl=@proc, 0x80, &(0x7f0000008380)=[{&(0x7f0000007240)=""/1, 0x1}, {&(0x7f0000007280)=""/52, 0x34}, {&(0x7f00000072c0)=""/4096, 0x1000}, {&(0x7f00000082c0)=""/156, 0x9c}], 0x4, &(0x7f00000083c0)=""/220, 0xdc}, 0xffffffffffffffce}, {{&(0x7f00000084c0)=@nfc, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008540)=""/33, 0x21}, {&(0x7f0000008580)=""/188, 0xbc}, {&(0x7f0000008640)=""/185, 0xb9}, {&(0x7f0000008700)=""/33, 0x21}, {&(0x7f0000008740)=""/20, 0x14}, {&(0x7f0000008780)=""/142, 0x8e}, {&(0x7f0000008840)=""/242, 0xf2}, {&(0x7f0000008940)=""/200, 0xc8}], 0x8}, 0x2}, {{0x0, 0x0, &(0x7f0000009e00)=[{&(0x7f0000008ac0)=""/156, 0x9c}, {&(0x7f0000008b80)=""/4096, 0x1000}, {&(0x7f0000009b80)=""/138, 0x8a}, {&(0x7f0000009c40)=""/120, 0x78}, {&(0x7f0000009cc0)=""/34, 0x22}, {&(0x7f0000009d00)=""/148, 0x94}, {&(0x7f0000009dc0)}], 0x7, &(0x7f0000009e80)=""/41, 0x29}, 0x200000}, {{&(0x7f0000009ec0)=@un=@abs, 0x80, &(0x7f000000a2c0)=[{&(0x7f0000009f40)=""/188, 0xbc}, {&(0x7f000000a000)=""/148, 0x94}, {&(0x7f000000a0c0)=""/241, 0xf1}, {&(0x7f000000a1c0)=""/199, 0xc7}], 0x4, &(0x7f000000a300)=""/32, 0x20}, 0xfb8}, {{&(0x7f000000a340)=@hci={0x1f, <r22=>0x0}, 0x80, &(0x7f000000a480)=[{&(0x7f000000a3c0)=""/184, 0xb8}], 0x1, &(0x7f000000a4c0)=""/203, 0xcb}, 0x1}, {{0x0, 0x0, &(0x7f000000c7c0)=[{&(0x7f000000a5c0)=""/4096, 0x1000}, {&(0x7f000000b5c0)=""/155, 0x9b}, {&(0x7f000000b680)=""/79, 0x4f}, {&(0x7f000000b700)=""/4096, 0x1000}, {&(0x7f000000c700)=""/59, 0x3b}, {&(0x7f000000c740)=""/82, 0x52}], 0x6, &(0x7f000000c840)=""/34, 0x22}, 0x3}, {{0x0, 0x0, &(0x7f000000cb00)=[{&(0x7f000000c880)=""/143, 0x8f}, {&(0x7f000000c940)=""/249, 0xf9}, {&(0x7f000000ca40)=""/147, 0x93}], 0x3, &(0x7f000000cb40)=""/180, 0xb4}, 0x4b3c}, {{0x0, 0x0, &(0x7f000000cc40)=[{&(0x7f000000cc00)=""/31, 0x1f}], 0x1}, 0x4}, {{&(0x7f000000cc80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f000000ce00)=[{&(0x7f000000cd00)=""/231, 0xe7}, {&(0x7f000000d000)=""/4096, 0x1000}], 0x2, &(0x7f000000ce40)=""/185, 0xb9}, 0x1}, {{0x0, 0x0, &(0x7f000000f000)=[{&(0x7f000000e000)=""/4096, 0x1000}], 0x1, &(0x7f000000f040)=""/90, 0x5a}, 0x2}], 0xa, 0x0, &(0x7f000000f340)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000f440)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r23=>0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000f540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f640)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r24=>0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f000000f740)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000f880)={0x11, 0x0, <r25=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f8c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000f9c0)={0x11, 0x0, <r26=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000fa00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000fa40)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r27=>0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f000000fb40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000fc40)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r28=>0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@empty}}, &(0x7f000000fd40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000fd80)={{{@in6=@mcast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r29=>0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000fe80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000fec0)={'vcan0\x00', <r30=>0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000010a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10c}, 0xc, &(0x7f0000010a00)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="e40a0000", @ANYRES16=r1, @ANYBLOB="000329bd7000fedbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="6402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400050000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="74000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000044000400000008e07f000000a50802fe06000000000100f80300000005000703ff0f0000010000c7040000000100010601000000070008070100000000007f020000ffff40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400a409000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f3d2000008000100", @ANYRES32=r11, @ANYBLOB="3c02020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000600", @ANYRES32=r12, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400010000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="84000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000540004000900030002000000e10be806e208000001000004ffffffff910e3e00ff00000000003b012000000006001feaff7f000040000700070000000100000380000000040006010300000007000104000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="7c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b0000000800040000e00f0008000600", @ANYRES32=r18, @ANYBLOB="08000100", @ANYRES32=r19, @ANYBLOB="8001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="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", @ANYRES32=r22, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="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", @ANYRES32=r24, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r25, @ANYBLOB="c000020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r26, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r27, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=r29, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004007400000008000600", @ANYRES32=r30], 0xae4}, 0x1, 0x0, 0x0, 0x80}, 0x4010) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85a97eca1349f6fc28afb67ea7d7c861c8cb7f4014ab6211090000202000020000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 15:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x8000000004) ftruncate(r1, 0x1000000) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000100)={"bed4a709fd574993c3e8ad6d2d2f8c750f1d18d1b7494cb82a04ef4696951784dbc3d658b68c8beaf352e647109877def811e069505b8423fd997b3a5bad8bf166f306693bcff27f173f181da5ab2c14552f508ee64fd3fca47ef2aec73db441bf44e1640d969519c3228c145f6e98a75f6859af1fcf072126ef6dfc8da754d96a6f1592e56c8530a2391c75d49ec5f74298ade63112a2849855038e98a7d2115cd261c3977bb8a7bfcb1dac836e2842420439f414c287dfc1fec3c85fe66b3162b5021b2b25d68685dff8ef2b240f35768bd43756f8f808b4ca85b8ad45f1f173b748276f6d80249069515d587bbee96af4087add4457090e5b986a33b9e5068c64f758aff19e3862b412c07592932e004e5232de06f068c8948843033091a645bbe40e91fbcc00a41b8dfe6a47882b6eb37b5b6e3fa5ab315a8ecf7bb5446c0cd46f7428e42333ee39546a1b428b00210c3a1518b716b64ab22d79784dac578ed136fbe59f71455e1642ad3e8e5294c9c407e358a17549653386d1024bf17557174153be0c71aad1639ad6155dc8b03be0a50a5b2295de8f16e243f9b0cefee029611ab72d0c760023ebe0a3d67a55da2f097273d948139395ab28b6ac2c56a7ad19895d29599a284461b8c06a96f0091274fd24fa4af60e552156fcb918fa519a3b3be27ebfc3af6562abf1046119df5a09e98596c0659cee17943a216c5ac1aed740277bbe382c4e28f942f5d99b4bab97e3496b9536430b12afc4f7d41754118f0b6010be326492a8aa1e1b62285c4cb97b3006ffab595208aa264147ab0aaa7dc0ad7513b4339f9b083b450818d0ceed7cb0ef0f785612bf0d2ef6a249d5c816386c614bda9ff81f5ba905c2bb74a7a2ed4532589c494e5dd94356132e58a01cbd6fe38c689b4c7b966a7929ea87388091ae43306e434d9df683a04e2fa4414ae1d94da1ac1ea83388ee25c4232e31b847698a29b0f4f3d2b21e58173a99bc93170908f30c351faa0b974f548cbf005c3958644a7f8a9541ef5f1544005f1fa45969a92bed2f2acbf5f5c2b05b93ff816d4d84025818b2f4fb52c316bdeb401ea1653e3d7f30ba9a9b026364ae5ffaa2eb02ae5b7f37f01788dfae273c504ec6c2091ff21b163bfb3ed3d32c4aa22949e604581972fcea4a55ef0f0dd5dfa47328e9b12b9014abb06125e42bb1a012245a04047e220fcc0acec1214c947dc7269c6d4f28712d69d2359fc125a39827faf43e5dca136e283c228b3aab077758b534e81132fdb8d74cc721cb8181e2d4fb8bfd158fbec32a1bf64caee535bff7aca876d1761fa897b8b9390ea1703bdf566299f004ec5e4c21acd69a7c53f5642c9de7dbd088c637a1114171ede1fea0a0ebb87e51583fbbf1ac5689c4aca301531b46ca0e1ce3246c564c28c57fe1042aff7bfe88bb03126dc4a5c4c091"}) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) 15:35:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="150800000000000000bdeca18ec265d4bb3f67781d375c000100000000000000070000060069620000000000000000000000000000fce2000000000000000000000000000000000000000000000000000000000000000000f2df59af97b2a62b045e6e4ca42b670000000000"], 0x68}}, 0x0) 15:35:19 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x84) socket(0x40000000000001e, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000000)={0x29, 0x1}) connect$inet6(r0, &(0x7f0000000080), 0x1c) epoll_create1(0x0) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 15:35:20 executing program 0: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x80800) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x46, 0x0, 0xffffffffffffff97, 0x0, 0xfffffe49}}], 0x1, 0xfffffffffffffffd, 0x0) fcntl$notify(r0, 0x402, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc3f96487908d9281d70") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140), 0x4) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:35:20 executing program 1: r0 = socket(0x22, 0x800, 0x2) getpeername$packet(r0, 0x0, 0x0) 15:35:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x2000000000000010, 0x3, 0x0) write(r1, &(0x7f0000000040)="2400000052001f0014f9f407000904130a00071008000100040000000800000000000000", 0x10289) 15:35:20 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) rt_sigtimedwait(&(0x7f0000000180)={0x9}, &(0x7f00000001c0), &(0x7f0000000240)={0x0, 0x989680}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") ioctl$NBD_CLEAR_QUE(r0, 0xab05) 15:35:20 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8000ffffffff, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xa92a, 0x82000) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) writev(r1, &(0x7f0000000080), 0x1a6) 15:35:20 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1, 0x71, 0xffffffffffffffff, 0x8001, 0x0, 0x3e, 0x3b6557ac, 0x381, 0x38, 0x3d1, 0xffffffffffff5208, 0x8, 0x20, 0x2, 0xbfb, 0xfff, 0x7}, [{0x60000000, 0x2, 0x7, 0x5, 0x8, 0x43, 0x100000001, 0x100}], "08220fd58ef7ec60dd016d9c3b6ad42350d0a4c0391d066046ebeff4f95c0cba9ef9ee41d2afeacdaa19ab7eb86dd9f25617d525ca3e3e5713fc60eb4249ec28f425f903fa5027e8074fc1765d2b5d3f3376e802553afa137802a706e75769833b6770185f0758c7601324e09d8af984de9f4c4d9dd3aa6b97585c7215ccef95ae98d25d", [[], [], [], [], [], [], [], [], [], []]}, 0xadc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8e, 0x10400) sendmsg$inet_sctp(r0, &(0x7f0000001380)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x3c000000000000, @empty, 0x4f}, 0x1c, &(0x7f00000012c0)=[{&(0x7f0000000180)="defe35f31af5ae0e809ca841d72fed7bdeb3999374f706ad5877e588739d691697988a07c42e4996eac2f8a7113be83ed7", 0x31}, {&(0x7f00000001c0)="344db84135cac644b558409c6ede2fc4b5526c91314ee9e52987e561e3b7d8b2761a40471026ece033666dc2f44f064f1b34fd6d375c26463e9388c13f3ed96d903a709a6a3ad8d229b4343e85a9229aba993376c743f6cd763a811ec8040b67c7db45ba7450044ad63b63ccf01201d82a1506b9fa9a605c696999d5cf259ea29ac7efcaedd143e2a24cf6244160f665107e1c23", 0x94}, {&(0x7f0000000280)="231050e071c280de97236a4f16125358676f19d125ac2c96f5787918977082f3dbb0371985c22611dfc320bd327f50ab84", 0x31}, {&(0x7f00000002c0)="8351fdfdb96695ac233343e57e184b9aefecfa3ec796767e9baeee3010c58b13ba2cf6fc3955085744bbd106e736bb764cd5a31355aa556dbed61ce380cd0f542fc8563774b194d4e79dfa0a64a3f1ef6f7171", 0x53}, {&(0x7f0000000f80)="1465eb1acde246fd29f92eef26d9045d138b6f132aeb88c39cf0fcfb4744758ae986bb740580b027e2b37805b006d98dbc02cc5f17eac239188fc9f096acbcbdfe061fda50f4297ad5ba325cf1d51a70763dcac29660d9d9ce27c4aaf17f9e1495e92a0acb", 0x65}, {&(0x7f0000001000)="8770fa1bba15939bf6d4aa68e6c085b55137c3cf5b0b741e7d570e7a6df057ed4f8e3884bfe1cad96c56770b384d5c62bf41b92dfbed0d53a4d758cae66af631ea322dfec5ce18c71b8a406ee7c0c3e4ad7e1be36421dd56f08e3002d28f331becf606874556b1dd6265144947c18e5c56d3bcfce93dc706e8691d841ced1cbbeb88f1aff55f12bddaced66151b4d98719d7ee264c", 0x95}, {&(0x7f00000010c0)="4a84310e8e128600bd22ce6da6642e191422e587c30fb975eaa4d7e189ba4dfb63c1e4e7f8b25e262cb28895854f09a3d480707e6dac92ec10218beec3443a2745fe3796255c9f1a7ab4fea7205a610f2990376ec4361eb060369de934a44b35b1bd4ef0af77944046901c13b0419ad31102208731117db41e48af39f527a5ce0c913ee540b9e939e98fbd6cf1f6", 0x8e}, {&(0x7f0000001180)="f41f51703b67916f6d573d9026a8a61e26cac80f832397c58c31cb2fd41822595dd1f32b43d460cbbf01529c6768dfb7e57811b1c96310dad2c07cdaca315b7314e54b33f5a083fc5db88666dc7a1b2d79", 0x51}, {&(0x7f0000001200)="af30a72d7c7fe892dfb5411f80d99f78f89d54d4714b18c1d523337a0d4d260cd65affdb9d28ec230517d23b6eb775f30c2bd29aad0fc9ac6dfba598afd1d3b7d3d44489a4d0cddec3105652a77cb6ede0e9199d79882ba8dbfa5e1192568c61ed7aa2413fe9e12537f6cffb2d9b32a189ff900ae92670bb44c0767415ab05500a3347a98f25c4c338015fc020d178db383b3030438b645826cb8459cd772508e239", 0xa2}], 0x9, 0x0, 0x0, 0x1}, 0x0) write$vhci(r2, &(0x7f00000013c0)=ANY=[@ANYBLOB="36234abde8ad0c8468e278679c314cd95bd0c6854a23bda9ce9cbb84946483543731ae805318aeb3c41470cf6f4c050fbcb37a942145cff4abafc00821560206e608090e2e4d367eb4489ea11b874e"], 0x3a) syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') 15:35:20 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) setsockopt(r0, 0x6, 0x8, &(0x7f0000000140)="d7a8975bd1280dd27feb5f43989ae69689b83cd709592794da2899758ea6c976de4811674c5ba36400a04b1424daae45e32404a051dc1f00e3ef0e7d25e8e7febcfdf2076982326e32855c142ca27e8b83daa15bea9e27e9e0fc011896dfca2ec348ddc77615e070f46da2f79e5c31d9241013ce794cc1", 0x77) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000001c0)={0x8, 0x2, 0x5, 'queue1\x00', 0xffffffff}) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1f, 0x0) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f00000000c0)=0xc40) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000280)={<r3=>0x0, 0x4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e22, 0x3603dd4f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x2}}, 0x501, 0xbf, 0x9, 0xffffffff, 0x40}, 0x98) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) getegid() ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept4$x25(r1, 0x0, &(0x7f0000000040), 0x800) ioctl$SIOCRSSCAUSE(r1, 0x89e1, 0x0) 15:35:21 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)={0x0, 0xa}) clock_gettime(0x0, &(0x7f0000007d00)={<r1=>0x0, <r2=>0x0}) recvmmsg(r0, &(0x7f0000007b80)=[{{&(0x7f0000000000)=@vsock, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)=""/234, 0xea}, {&(0x7f0000000180)=""/21, 0x15}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000380)=""/126, 0x7e}, {&(0x7f0000000400)=""/100, 0x64}], 0x6, &(0x7f0000000200)=""/28, 0x1c}, 0x2}, {{&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000580)=""/169, 0xa9}, {&(0x7f0000000640)=""/127, 0x7f}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/119, 0x77}, {&(0x7f0000001780)=""/214, 0xd6}, {&(0x7f0000001880)=""/171, 0xab}], 0x7, &(0x7f00000019c0)=""/4096, 0x1000}, 0xb4}, {{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f00000029c0)}, {&(0x7f0000002a00)=""/24, 0x18}, {&(0x7f0000002a40)=""/115, 0x73}, {&(0x7f0000002ac0)=""/180, 0xb4}, {&(0x7f0000002b80)=""/91, 0x5b}, {&(0x7f0000002c00)=""/143, 0x8f}, {&(0x7f0000002cc0)=""/22, 0x16}], 0x7}, 0x5}, {{&(0x7f0000002d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002e00)=""/140, 0x8c}, {&(0x7f0000002ec0)=""/129, 0x81}, {&(0x7f0000002f80)=""/104, 0x68}, {&(0x7f0000003000)=""/43, 0x2b}, {&(0x7f0000003040)=""/168, 0xa8}], 0x5}, 0x1494f238}, {{&(0x7f0000003180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000003200)=""/133, 0x85}, {&(0x7f00000032c0)=""/50, 0x32}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/88, 0x58}, {&(0x7f0000004380)=""/82, 0x52}, {&(0x7f0000004400)=""/196, 0xc4}, {&(0x7f0000004500)=""/163, 0xa3}], 0x7, &(0x7f0000004640)=""/202, 0xca}, 0x7}, {{&(0x7f0000004740)=@nfc, 0x80, &(0x7f0000007a00)=[{&(0x7f00000047c0)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/16, 0x10}, {&(0x7f0000005800)=""/84, 0x54}, {&(0x7f0000005880)=""/4096, 0x1000}, {&(0x7f0000006880)=""/16, 0x10}, {&(0x7f00000068c0)=""/231, 0xe7}, {&(0x7f00000069c0)=""/4096, 0x1000}, {&(0x7f00000079c0)=""/38, 0x26}], 0x8, &(0x7f0000007a80)=""/228, 0xe4}, 0x8}], 0x6, 0x40, &(0x7f0000007d40)={r1, r2+10000000}) pipe2(&(0x7f00000029c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff}, 0x84800) openat$cgroup_ro(r3, &(0x7f0000007d80)='cpuset.effective_mems\x00', 0x0, 0x0) 15:35:21 executing program 5: syz_emit_ethernet(0x26, &(0x7f0000000040)={@remote, @remote, [{[{0x9100, 0x3b3, 0x2, 0x3}], {0x8100, 0xaa81, 0xe87}}], {@can={0xc, {{0x0, 0x0, 0x1000, 0xfffffffffffffe01}, 0x1, 0x3, 0x0, 0x0, "5ec379017a8555d7"}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e21, 0x8, @local, 0x5}, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x101}, 0x4, [0x1, 0x1, 0x3ff, 0x100000001, 0x23b0, 0xe62f, 0x3a3bc000000000, 0x6]}, 0x5c) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0x81, [{0x1, 0x0, 0x4b7ad9f0}, {0x8, 0x0, 0x2}, {0x6, 0x0, 0xfffffffffffffffb}, {0x3, 0x0, 0x84}]}) [ 798.401604] kauditd_printk_skb: 207 callbacks suppressed [ 798.401614] audit: type=1400 audit(1556724921.329:17079): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 798.533870] audit: type=1400 audit(1556724921.339:17080): avc: denied { map } for pid=23125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff1b, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}}, 0x48) 15:35:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x5, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x2d2440) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x8000, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x4c, r1, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x401}, @NBD_ATTR_INDEX={0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2fbeef6fddac7fc2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) fstatfs(r0, 0x0) 15:35:21 executing program 0: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="8887016f10e6d99d3fbeba7b34e7d0ba087df6818c0d005c08616c708a05272817c8a03554205e4b5e0b", 0x2a, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a30a9bd5a28e297e8bbb98d42ce8f3a8403b7494792f65359363c641532d3b2a45288abdb3d957ccd5ea5ed499599d6e140a801dec8170af7f10346520a507ca2b3a5e68e3b9d811b361caa004c94ce4d29ace4981f38511a47bf6fb5f097016b26e1d6db7c759a1ae7abedd544cdf94a664491672e98bfdec5edf48dd32d999d9bd29a281db9de664e5a0faaf2c0b99aeaf00f7a480ffd0e4", 0x99, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000280)=@chain={'key_or_keyring:', r1, ':chain\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x8002, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000480)=""/92) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) 15:35:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x2, 0x0, 0x0, 0x8]}) syz_execute_func(&(0x7f0000000000)="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") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) prctl$PR_GET_TSC(0x19, 0x0) [ 798.682558] audit: type=1400 audit(1556724921.369:17081): avc: denied { map } for pid=23125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0xb, 0x0, &(0x7f0000000080)=0x7ffffffff000) close(r0) [ 798.817075] audit: type=1400 audit(1556724921.369:17082): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 798.945551] net_ratelimit: 26 callbacks suppressed [ 798.945557] protocol 88fb is buggy, dev hsr_slave_0 [ 798.956450] protocol 88fb is buggy, dev hsr_slave_1 [ 798.995504] audit: type=1400 audit(1556724921.379:17083): avc: denied { map } for pid=23125 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.025604] protocol 88fb is buggy, dev hsr_slave_0 [ 799.030730] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x5, 0x3, 0x0, 0x1, 0x3, 0x1, 0x7, 0xd4, 0x4c, 0x4, 0x7ff, 0x3, 0x66, 0x1, 0x1, 0x8}}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect(r1, 0x0, 0x0) [ 799.179451] audit: type=1400 audit(1556724921.389:17084): avc: denied { map } for pid=23125 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0xb, 0xb, 0x28, 0x70bd28, 0x25dfdbfd, {0x1, 0x0, 0x8}, [@generic="79c4997f9de0fe6a865d76ca1c3eef80c4772fe182bc23bf043376d205cf95f56ad62d56bd50532a35b6c1f2fe2b5ad89c35999394cf8b734c5e2e4e809e6f84eb038f79cbef084e"]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000050}, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000006f80)=""/145, &(0x7f0000005740)=0x91) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000001c0)=r3) [ 799.386128] audit: type=1400 audit(1556724921.389:17085): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.425564] protocol 88fb is buggy, dev hsr_slave_0 [ 799.430698] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1000019) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x30b002, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000180)={0x0, 0x400, 0x9}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="170000001400192340834b80040d8c560a067fbc45ff81", 0x17}], 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x20000) getsockopt$inet_buf(r2, 0x0, 0x26, &(0x7f0000000040)=""/55, &(0x7f00000000c0)=0x37) 15:35:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0x87d, <r3=>0x0, 0x1, 0x1000}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000140)={0x80, r3}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000080)='./file0\x00', 0x1124, 0x0) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x282, 0xfffffffffffffffa) fcntl$setstatus(r5, 0x4, 0x3fffc) read(r5, &(0x7f0000000100)=""/7, 0x7) ioctl$TCXONC(r1, 0x540a, 0xffff) write$binfmt_aout(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="2f9ed9acf3a598ad4e36eebea068aeabb452137be7910bbe391ac5c2dc399fbc2245bc592341c51171ab7342199844bd67f526b2831c352fbbbdf79f9600"/84], 0x1) accept4$netrom(r2, &(0x7f0000000180)={{0x3, @rose}, [@rose, @netrom, @bcast, @remote, @null, @remote, @default, @default]}, &(0x7f0000000200)=0x48, 0x800) [ 799.653248] audit: type=1400 audit(1556724921.399:17086): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.677493] protocol 88fb is buggy, dev hsr_slave_0 [ 799.677546] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c40a2b7b294b97a49c0b9a76240ac2fb2283b542f74d77d0d9ee5d31701130ab2af6e8484dd4efe9c11540f7d67a4"]) mount(0x0, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400400, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000200)=0x436, 0x4) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x44) write$P9_RWALK(r2, &(0x7f00000004c0)={0x9, 0x6f, 0x1, {0xb3, [{0x8, 0x0, 0x5}, {0x42, 0x0, 0x4}, {0x1, 0x1, 0x8}, {0x0, 0x1, 0x3}, {0x80, 0x1}]}}, 0x9) [ 799.906517] protocol 88fb is buggy, dev hsr_slave_0 [ 799.912203] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4200) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)={0x0, r2}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x80000000, 0x20183) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="6dfeffff2000ff0a0000000000000000040000006d696d655f74797065766d6e6574312e706f7369785f61636c5f6163636573737b79216608058b29f15763b3d6cbbe2e76626f786e657430"], 0x9d}}, 0x0) [ 800.011002] audit: type=1400 audit(1556724921.429:17087): avc: denied { map } for pid=23125 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 800.188554] audit: type=1400 audit(1556724921.439:17088): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x141480) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) read$alg(r1, &(0x7f0000000040)=""/133, 0x85) 15:35:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', <r3=>0x0}) sendto$packet(r2, &(0x7f00000000c0)="3028336d5b4605f2aabc2846474c21005c949929bf027f4beafc255ee2fcda5a4175534b07946d837ba44198ae8b89cca763d669de", 0x35, 0x800, &(0x7f0000000180)={0x11, 0xf6, r3, 0x1, 0x1a, 0x6, @dev={[], 0x10}}, 0x14) socket$inet6(0xa, 0x6, 0xfffffffffffffffa) 15:35:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={<r2=>0x0, 0xfffffffffffffbff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, &(0x7f0000000140)=0x4) 15:35:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x3, 0x4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@broadcast, @broadcast, 0x0, 0x6, [@empty, @multicast2, @loopback, @remote, @broadcast, @empty]}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00]}}, 0xfef5) mq_open(0x0, 0x0, 0x80, 0x0) 15:35:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000002c0)={'broute\x00\x00$B\x00', 0x0, 0x0, 0x0, [], 0xa6fc959c1e1280f8, 0x0, 0x0}, &(0x7f00000000c0)=0x78) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000000)="b68f6412529683305a4aac98567aef659e5932bf1e071ed141b027c3b32b03972ff129739a14ed1b09f3c403991ce538b441875ccab37d55cbb867aac1de6707091ebce575866a43d1e9ddaa45ef5a60033b2af3396783757f7d7e", 0x5b) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r2 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000340)="ba5dcf111a7aa42fb8f708bcdd9d9873d72403677fb0e7d5bad123ef41c5bc31d5d2cd5f688a9cac3a18b08b84afcf449ddc0d448eca9b2eb5f513c500dfece12ac70c0eefd122ddbdec25cf5c8576d3a2301665e5bd06b4907168ce5c1985c0ebdd04031c92cf44c62b80e6603a8e6a62d5b75bcce5fd5c237a0607ff89cc9da7000b40610b37360b2507b5ea348c0539873b50bffd45ff64643a5256f9778805285e0be9b32506274bfd052f98815b61bd51679cc26db01ce55e4aa6499f818e405f63bc1ed1042b127fdce653503d204903b19b5bfbc1ac3b", 0xda, 0xfffffffffffffff8) keyctl$unlink(0x9, r2, r3) getegid() ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000100)={0x7ff, 0x1f, 0xff, 0x0, 0x6, 0x40, 0x6, 0x6, 0x6, 0x6, 0xfff, 0x100000001, 0x0, 0x9, 0x8001, 0xba4, 0x100, 0x8641, 0x9}) [ 800.940026] IPVS: ftp: loaded support on port[0] = 21 15:35:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x2010400000000019, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x9, "d60700000000000000000032f101000080917149fd661837b011b15f24fc4d12", 0x0, 0x0, 0x0, 0x70effc, 0x100000002}) 15:35:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = dup(r0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000200)={0x2, 0x0, [{0x101000, 0xe9, &(0x7f00000000c0)=""/233}, {0x5000, 0x3c, &(0x7f00000001c0)=""/60}]}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000280)=0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000000c0), 0x0, 0x701) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000080)=0x2) [ 801.091123] cannot load conntrack support for proto=7 15:35:24 executing program 1: mkdir(&(0x7f0000001440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x78f) 15:35:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) fcntl$getown(r0, 0x9) getpgrp(0xffffffffffffffff) getpid() r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x80000) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f00000001c0)="3d379f6b26da4970c31ec20257a762fc077816bb4b63c4031f67d7dd470a0fa864bd98f431c63dbfc534f8f3beff401e85ca6139220f2a93c4252db95277be05507ef4162809ee7b9a3eb8ab2485db41568e7d2ccc0513869e1368b90b830411a32e6df0a8bdf53fb3bfb072a2092821f0daaa4fd2d8b42dd3018b7354f0b9b93a9a1dbf16a00bbe2eb7d1ec43188d3f83d2", 0x92) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=<r2=>0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/ip6_tables_matches\x00') preadv(r3, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x0) 15:35:24 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x413f, 0x0) 15:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x51) r1 = socket$inet6(0xa, 0x807, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}) setgid(r2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x26, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000002c0)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x381}}], 0x6fdaec, 0x22, 0x0) [ 801.739680] cannot load conntrack support for proto=7 15:35:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 15:35:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') fdatasync(r0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0}}], 0x0, 0x4, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={<r3=>0x0, @empty, @remote}, &(0x7f0000000100)=0xc) close(r0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={@rand_addr="25d131f09409a4fa8ed33a6f75d738d7", @remote, @loopback, 0x9, 0x1, 0x9, 0x400, 0x8, 0x63de50fce1440324, r3}) preadv(r1, &(0x7f00000017c0), 0x23f, 0x0) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) sync_file_range(r0, 0x1, 0x4, 0x2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000002c0)='syzkaller\x00', &(0x7f00000003c0)=@chain={'key_or_keyring:', r5, ':chain\x00'}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x4, @local}, {0xa, 0x4e22, 0x6, @mcast2, 0x100000000}, 0x5, [0x3, 0x7, 0x1, 0x3ff, 0x0, 0x7, 0x414, 0x81]}, 0x5c) 15:35:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000000)=0x60) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d7cfcfc61"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x541a00, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)={<r2=>0x0, 0x32, "a292bf2873dd11aca329133283655a2157bb88279dcc228b7f011ca37ef27372c68da87031b827a159f8d0b499ae07e7f7c8"}, &(0x7f00000000c0)=0x3a) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0xca}}}, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="4e000000000000000000000001000000"]}) 15:35:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x8, 0xd) syz_execute_func(&(0x7f0000001200)="264a2ae980d0da964c0f05bf07000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db00230200c4235d79cd3ff30f38f6c5c4a13b5a97ead04d13c4a265aa104b8d26c4c24bf6b7d2bf7b5e660f615f1e642f64631bc421045f4607c421ddb7582b9fc4149fc4c4e37d397632bd26f2f045f602b164640f6f43a0660f6e6da6a9262e2e66450f7d64c6088f292001720bad0383397fd3ff3a65f20f7cd8efa1a12ad764d38f53efaf6766f2ab6626f04618acdf07000000c443a922c6fe660f79cec462b1f72ec300000000000fc4634148f700c4a1bd74055c540000a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc2675c442650739e5c4a1fe162be5a700000f3e666690d25c660f41767ff30f5ea5a9a50000fff5c463fd017c63ae0fda3131b83a00a2f16541d9f0fb766208cf") r1 = dup2(r0, r0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) 15:35:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000480)={0x3, 0x0, 0x2080, {0x5000, 0x7000, 0x1}, [], "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", "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"}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101080, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:25 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="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") sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0xfdd1, 0x0, 0xffffffffffffffce, 0xfffffffffffffffe}, 0x0) 15:35:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0adc03263c343f319bd070") clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000000000028) 15:35:26 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x1000002000089f0, &(0x7f0000000080)={'bond0\x00\x00z\x1b\x00`\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x00?\x00H\x00'}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x80000) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000000c0)=""/184) 15:35:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 15:35:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x20) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 803.540749] kauditd_printk_skb: 230 callbacks suppressed [ 803.540758] audit: type=1400 audit(1556724926.469:17313): avc: denied { map } for pid=23259 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400000, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000000c0)) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff020}, {0x80000006}]}, 0x10) [ 803.681838] audit: type=1400 audit(1556724926.469:17314): avc: denied { map } for pid=23259 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:26 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) r2 = mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)={r2}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4002, 0x0) [ 803.862928] audit: type=1400 audit(1556724926.479:17315): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:26 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x2102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nullb=':4\n:d]:.,[:\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x1, 0x4) [ 804.022819] bond0: The slave device specified does not support setting the MAC address [ 804.065609] net_ratelimit: 26 callbacks suppressed [ 804.065615] protocol 88fb is buggy, dev hsr_slave_0 [ 804.075722] protocol 88fb is buggy, dev hsr_slave_1 [ 804.115332] audit: type=1400 audit(1556724926.509:17316): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x2, 0x7fc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/36, 0x24) syz_execute_func(&(0x7f00000003c0)="f3410fbdc5cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0f450fbd27a95ff965be3c3b6446ddcb01ef8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c1460000e1b1c482010804f445e22c892a0f0000009f") [ 804.225547] protocol 88fb is buggy, dev hsr_slave_0 [ 804.230811] protocol 88fb is buggy, dev hsr_slave_1 [ 804.305545] protocol 88fb is buggy, dev hsr_slave_0 [ 804.310729] protocol 88fb is buggy, dev hsr_slave_1 [ 804.353600] audit: type=1400 audit(1556724926.559:17317): avc: denied { map } for pid=23259 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x2, 0x0, 0x2, 0x8, 0x7}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 804.510839] audit: type=1400 audit(1556724926.609:17318): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f0000000000)=0x166) 15:35:27 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x420402, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x8, 0xd07, 0x3, 0x4}, 0x10) r2 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000040)=r2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)) [ 804.742338] audit: type=1400 audit(1556724926.609:17319): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='environ\x00') readv(r1, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000000100)=""/112, 0x70}], 0x3) [ 804.800231] libceph: parse_ips bad ip ':4 [ 804.800231] :d]:.,[' [ 804.886268] audit: type=1400 audit(1556724926.679:17320): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x8, 0x12) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x12, 0x100000000004002, {0x5}}, 0xfffffefd) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) 15:35:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x34b, 0x7}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x400000b7], [0xc1]}) [ 805.135602] audit: type=1400 audit(1556724926.699:17321): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 805.185535] protocol 88fb is buggy, dev hsr_slave_0 [ 805.190748] protocol 88fb is buggy, dev hsr_slave_1 [ 805.265555] protocol 88fb is buggy, dev hsr_slave_0 [ 805.270716] protocol 88fb is buggy, dev hsr_slave_1 [ 805.287374] audit: type=1400 audit(1556724926.739:17322): avc: denied { map } for pid=23265 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180), 0xffffff0c) sendto$inet(r1, &(0x7f0000000000)="d6b720d1bb5e739f4f73d95582c7039dfdfb8b58bf2d5e", 0x17, 0x8c1, &(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') connect$vsock_stream(r0, &(0x7f0000001280)={0x28, 0x0, 0xffffffff, @host}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x820800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0xf00, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) read$FUSE(r1, &(0x7f0000000280), 0x1000) 15:35:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a7fa84084b584dc1f123c13b7d502009bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') dup2(r1, r1) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:28 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x8000000000084) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x5}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000580)={0x0, 0x5}, 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x11, r2}) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x0, 0x80000000000000b3}, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5f, 0x8000) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f00000003c0)=""/244) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000240)={0x0, 0x0, 0xffffffff7fffffff, [], &(0x7f0000000100)=0x6}) 15:35:28 executing program 4: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000040)={0x399f1336, r0}, &(0x7f0000002000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x80000000000}) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r1, 0x0, 0x2) fgetxattr(r1, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/5, 0x55) ustat(0x6, &(0x7f0000000080)) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000100)={0x34, 0x7fffffff, 0x4}) 15:35:28 executing program 3: 15:35:29 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000180)=0x1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000140)) listen(r1, 0x7) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=<r4=>0x0) fcntl$setown(r1, 0x8, r4) sendto$inet6(r2, &(0x7f0000000040)="b0a68e3606509d744caf132440ea28787ed3060f3a4e90de81883fd6b9ceb00bc9fa3cee738bc12d57532908331cf2e77bca4792a080d4d5ce5d7be3b596c1dd40c74c0f502c24b168db54c40ab6750229c5b87c", 0x54, 0x40004, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r3) 15:35:29 executing program 2: mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0xa00000, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@loose='loose'}, {@cache_fscache='cache=fscache'}, {@cache_loose='cache=loose'}, {@uname={'uname', 0x3d, '*cgroup$'}}, {@debug={'debug', 0x3d, 0x2}}, {@access_client='access=client'}, {@access_user='access=user'}, {@debug={'debug', 0x3d, 0x7}}, {@debug={'debug', 0x3d, 0x1ff}}], [{@dont_measure='dont_measure'}]}}) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x244000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r4 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x20, 0x101000) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x4000, 0x0) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='cpu.weight\x00', 0x2, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x100, 0x0) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x40000, 0x0) r9 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r10 = userfaultfd(0x80000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000280)="5018d5809b0cc3dd0d088fa7b8b39e077a7f858424ab00ad430b01f654917f0df3a4f69b0e58f491a6328095dcb7b7cc5798fbf623971be0e107dfdf0a4c34a8837ba8c9396af00661f29850b2aafec77be3261d991fa9f65a8fd3126b9c6503c2c074a2f556a3b1cbe7e74e3c790e08097a162198992331419f9300fb67d674793dd6b173f3c4cec2b718e1403cd9f82baf56fe21", 0x95}, {&(0x7f0000000340)}], 0x2, &(0x7f0000000580)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x30, 0x1, 0x1, [r3, r4, r5, r6, r7, r8, r9, r10]}, @rights={0x18, 0x1, 0x1, [r11, r12]}], 0x60, 0x40}, 0x85) setresuid(r0, 0x0, 0x0) setuid(0x0) setuid(r0) 15:35:29 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @empty=[0x80fe, 0x2, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x73, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x1) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000040)={0xa55b, 0x3, 0x2}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/dev/midi#\x00'}, {}, {0x20, ':\')'}], 0xa, "91fa48d8a2b3835b89ae2c1ed60a2ea9bbcd1a3425bd0c2161c19e64d7d76bd7db7e69ade5f2e9f240f69df1313a407fbeed9fe4b8b32b26e804ee254a2e6b38f794d177f217d304b2b3f7ccbbf1dd"}, 0x6b) fcntl$notify(r0, 0x402, 0x20000001) 15:35:29 executing program 0: r0 = socket$inet(0x2, 0x80800, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0xb93}], 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x101000) mq_notify(r1, &(0x7f0000000300)={0x0, 0x23, 0x0, @thr={&(0x7f00000000c0)='*+i', &(0x7f0000000580)="699cc56b40acd95b2404c6d94a33e056f01f9bf3eadc1f8eb20ace21862094a3c8ea09f4ef3740474f8532e63ada2d874c7bc5b1a19df5233cd609295c7bc96a5ce8fb8ddb77936d31033e9b2a11ab69dd4731dd2d7a4a9b0b1440efc316987b3eeaf8962195133c990d81ff506d37e2092cbdc591ba49dc8c2a69843050da1dfd69220fc3943e1594ad1083608e32a0849eff7530c189faabbeab8e0fe171c799fa53e344c322491325524259b7d5b97ae6e5a2dddf82986995ac8407bdf61f8cca1f808766746f890c0484d1ecae8433513e3befd2"}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000004c0)={<r2=>0x0, 0x6eba, 0x200, 0x9591, 0xfcf, 0x1e}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000540)={r2, 0xb3c}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)=ANY=[@ANYRES32=<r4=>0x0, @ANYBLOB="410000005895629c0635ff038f33d893eaefa2afe4843944d0151009e79f6315d255e811b3a5e5a9ce177abddfb386a172cdae41f0b8140fae83c32e16a2c3205698d1a77e"], &(0x7f0000000180)=0x49) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e24, @local}}, [0x3, 0x3, 0x3, 0x200, 0xbab, 0x0, 0x7, 0x1, 0x8, 0x1ff, 0x8, 0x2, 0x5, 0xfff, 0x7c8ce43e]}, &(0x7f00000002c0)=0x100) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) 15:35:29 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x3) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f01010000312c776f4d0d56666c80fda2ea99e70a726b6469723d2e2f66696c6531c2b0097b6775eb7b1d658e1268748fc268b88c6066eb54f911bceae4b577f6f7e6c2f947e7e334dfc51e5ee9dbd8653a"]) chdir(&(0x7f0000000380)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stat\x00', 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:35:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port0\x00', 0xfffffffffffffffe}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000100)={{0x0, 0x1}, {0x80}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000500}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, r3, 0x820, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4a4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x800}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x9}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x10) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000340)='/dev/dlm-monitor\x00') 15:35:29 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x0, @local}, @in6={0xa, 0x4e24, 0x7fffffff, @dev={0xfe, 0x80, [], 0xe}, 0xfffffffffffffbff}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e24, @remote}], 0x58) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="03000d0000000007009ae3d1cc93cf5c57befd3340acc65289a9feefe161db0e0f775491622165fff56367f61516cb1fb6077ae82d454f1975fa1bece7059f424ad1e20261f3560548a10c663c526d5ae5c2323bd816a608b88fe5c24456e00f8776bbca23d4c440c66fe88a6357dcb65bfbc11c538b8ee2993ffc3406a7d7477952dcd22896e4f535a342ad5d3bd0b4a387d396b767d23f100e9a3079fb1424279cb633b7b05f60edd27314a999a8386d3522f6f49bf2836c92d8fd11dabbea82b465f3874b0fc3a03599bd5a7ac5afd95d2c81a63eb6"], 0xa4, 0x3) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000002c0)={@empty, @remote, <r1=>0x0}, &(0x7f0000000300)=0xc) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x7fff, 0x6, 0x8, 0x0, 0x2}) ioctl$KVM_SET_CPUID(r0, 0x8008550e, &(0x7f0000000000)=ANY=[]) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0xfffffffffffffffe, 0x3, {0x7, 0x1d, 0xe1, 0x200000, 0x100, 0xfffffffffffffff8, 0x3, 0x8}}, 0x50) 15:35:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={<r3=>0x0, 0x7, 0x1, 0x7e000000000000, 0x0, 0x1000}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x84) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x0, 0x0, 0x208000, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000280)={{0x8, 0xbb9f}, 'port1\x00', 0x80, 0x40, 0x2, 0x7, 0x80000001, 0x3f, 0x3f, 0x0, 0x0, 0x7f}) 15:35:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x4000000000000d4, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="dbf38d4efc20867da4006b7f1e18600adc1f77d44fc9aad5123c") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v<D,g,\x81\xa0\xe6h&\xdd^\x16\xe6\xb8\xb6\xb9\x7f\xdc\"\xa1\x06\xc3\x87\xbc\b\x0e6\xbalN\xa1\x13\x86\x17\xaf\x0e\xd8\'i\x95\x8bm\xd9\xd2\x95\xe4u\xff\xbb\x8d\xc4\x06\x05\x9c\x87\x91\a\xd3_\x14.\x1e\xe3\xd7\xbe\x89\"A\xb1\xd7g\x98\x1aW\x18\x82\x1c\xe76\xbe0vA\x13\xe0N\xc6o\xc3\x1b\x8d\x9at\xb4\xac7\x1b\xd4\x15\xe0\xd0\xf4\xa7\xff#\x7f\x8e\xba\b/\xc9\fi\x03\xd6\x1fH\xa8`\x89-\xc5J`A\xefm!}\xef\xe5J4\xbf\xe6H\xaa\xf9$d.\xbe?#\x18\xbf\x9f\xd3\xc3y\x1a?\x16\xb0A\xe4j\xae\xb6\xd1\xe2\bHj\x02\x8c#%\xbf\x15\xf7\x95\x15\xe2\xdab\x17\x10D\xa1{y\xc1I1$.\xeb\xadf\xdb\xdd\xc4(\xb2\xba\xb4zI\x02') preadv(r1, &(0x7f00000017c0), 0xfffffffffffff26, 0x700) 15:35:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132230) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x800000022) fcntl$setstatus(r1, 0x4, 0x142802) 15:35:30 executing program 4: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x400, 0x8) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getresuid(&(0x7f0000000000)=<r2=>0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, <r4=>0x0}, &(0x7f00000002c0)=0xc) setresuid(r2, r3, r4) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 15:35:30 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x5398fffb08fec7ed) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 15:35:30 executing program 3: r0 = socket$packet(0x11, 0x151f2789250d6ed0, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000004ffc)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x183483, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000040)=0x8, 0x4) 15:35:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44001}, 0x4080) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000001ec0)='ns/uts\x00') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, <r2=>0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$vivid(&(0x7f0000001d80)='/dev/video#\x00', 0x0, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000e000100}, 0xc, &(0x7f0000000b40)={&(0x7f0000000300)={0x828, 0x25, 0x0, 0x70bd27, 0x6, {0x13}, [@nested={0x14c, 0x39, [@typed={0x8, 0x2b, @fd=r0}, @generic="bced17fcc1b7cdd124c26c7afe3145af6ade9db51462c7ed5dcf78d979b97da315801190f10c72b86e6419d79d233d8062f8e9ecb518f343a4d7", @typed={0x8, 0x83, @ipv4=@dev={0xac, 0x14, 0x14, 0xb}}, @generic="232b8e16e766d76eb716ee3a212aff0627157d5077dc73fb52ff42f3670f0535507680f7870fa0cf024cbc6bcc24efffb35d7affad81f34cfe10d57ba2cdd1bf92d63fe2e1c0b9bb416ed5ec9dd0b21e248fcca83f8b111a0813bdd2500e924281de174d341f8adeeeea6ec5ca01d494d87a738254d88da933bcd1472b1f2ca34a2dbb2e59b1bbc10eddf8999f57561de49eb7f0b6e355d8a0078bf277890d7e9087931418ec17bb87297f2db550452fdc27e689b8bbcb273380ed7833d9837a62a365dedd07caa17068210849c82b4d0ee2cd66437a71b54aabf6f0ffd47b517660b908586370c255b26e68070d3cf5f2e4cf8830", @typed={0x8, 0x3f, @uid=r2}]}, @generic="938e83be4dbd3b3a235bd0fac205c63d4b291420c61bed049ec66222458cb6f77f75f6515001739aed968d50405cae5a75c58e5648b398bfff222d36a4e85d78670856512239fc510d00ad6cc2e77baafbbe225577f9086210ff3354ff98743ec16c7807bbf636b46569c50474efdd0f25b9dd714acc673c7ae32b5a507c1fee709b3e", @nested={0x104, 0x61, [@generic="64b682c5f61969d1acc2b7279f2c551a417ea039dd6d9b790967af10052d60f8334e1f614e08ff25fb8eab7d428ab329a8c4e93043841a695432dbcd0e140d5c2457590860a0b1eb541bcda38f6498bccb6296f54ef803065591bd22725b2e82994c2226e1100448b412bafaaa932629a03e2e458aca5ec7b31a96a48c6c7471b8c581c4d332282c5af14e8523bd57917d9fb605a6b736472c7df5aa381b91aaa68e95a3b277b349ea5f4f0589d1f4178e35f8", @generic="16e76bdfa0c088834f7cdd090ce0fd797db14fe3b7e56f6582b1219dd4fbc5496bf4497f3e84fb8653428bdc4ec7a2c97e3ceebec30639c750305aaa3314b890cfc5cc14be6d2f296b26f8c1bc"]}, @typed={0x8, 0x19, @str='fou\x00'}, @nested={0x158, 0x4d, [@typed={0x8, 0x3e, @u32=0x9}, @typed={0x8, 0x5, @str='fou\x00'}, @typed={0x8, 0x5c, @fd=r0}, @generic="8570d4e416d48db2d597aee3968f1cf205f6c3aeb026453f69db0bff237b306c23ae42eca373de80971a6e7dd5defa84adaf4f9c6755be38ead26ccd8522dd1414a2d418b1bfed", @typed={0x8, 0x17, @fd=r0}, @typed={0x4, 0xd}, @typed={0x4, 0x31}, @generic="8ecd0013ae9bd198a45b83d11b5f40544d4f629a01e888f079e934bc579e3b1036cf99ff70988f9f4a37b9eb723f88df316a48ee6dc6e81c8c6458f8e845a1a6411209390b514419f2caf2d6db5451567924ff8bd06fc16b00446784cc36eba3d311c99f5fc912937d0a975a83", @generic="69b0a5089bc0a98b5b15b1988aec811d413fb351aefe053a375682672ca74c3e63e3f6dee3b72d653ff3e9af2133929377f26673e06f23da9d21b991df996b5117d056bb7888a5c99016ec2c93329e4fd14baea24f7cc9100f5889feca7f83023ef2b8fcceb0ea6f55e333797de9", @typed={0x8, 0x3f, @uid=r3}]}, @generic="24d42a35b01872c22a5b236e810ea752c19c10664c35d47ce29ded0f958c160ad37a76f0a1c84673524f409c4e53fc2aa784a8885e81356cc2c87791ab3af8624536c3e8e8a5726da052d491d5ee927ebc38ebb998ceae03bbcd3cb55226e0dd224a90b234841f0f0f82e8af46248cbe6ef34fefd3ac40c68c112f5a7b1268588ff11bd142dc9686f2f64f5e31d70ee7077183cb909f76a0ceb97444412b32e1138f943ea011f86fbe3404bffe6d8f62bbff9eea282f22caf376a697a10de140347a756f5842ad6cc172c791d87a5c74458fe438402e82f8295cc21fc785046e771a0db0b64dc2a511f2c88a83e0b71085585b7890bda2dae9e9aeed", @nested={0x4, 0x13}, @generic="32328e2da8741184bc2d91f8d8789cbbe6a1aaf23edcffe3864d464ac0b6e99d2a3a1b87bf7b621238e7e78e18c5b97a0560c012e72c6fb442277c19218aec2f474ed7be0a2f17fa34d0af8445655dd7c98ab9422416b554000d8938ff6733a047a816500dd1b267352a72ad2bb41d0c1088f8b6a507e5609cf53d8c4f606b3cdf11c3", @generic="ba9a488afa3a093f09c5b212574f48467778b5281a7bbdd7e1e3909399ab4a1f967c885a378e1f0f10d36370029c898b34583335cdc83d4af142b648fe0d011a8a3750aae41f7e0b19eb38c8d6245f1bc5fb79b5854336e73e34bd307fdf2a4b6ed142d15a11ec936d7a27e504dc77acb6734a8878bfce5800e07d770ba23fcd0a4568041cbe15c845414dc3497a593ba6b0d48e783f9a28f466ccf5f934f1085b82e5c540fe468e66d40d801e4e013d6572220fefa467a4cb15b0deb68209688a9e2996817506f596d97e0b", @nested={0x190, 0x1f, [@typed={0x4, 0x6b}, @generic="85343caf83e49525e59ae7bc3aafa1634ef4fa905e5fc99404f8031007219dc5ebd195d7fea788557655c51de07e4de223aeb1766604e6e92436d9f535ee14d3138c85e59f5dcf4ffe7100749ed3ebeac2a32e1fe3e659b2e3ae18f3c72685bd9bea8bb8cec87858891483e3c642c5b6615aa1a0de2f173455362aac02ea3951d3d65ddf0276a4c320557d4fe5d16599b1fe8bdd395beac4dae53c182e4a2662e7fe7bcbd4f31ea2444daf4a79e37a8b175776b202c08ada53d3971af66372b080c9aaed8f29b818fc760cc9f900d3f0b493500ce50048a9d2e1f476f77b6a67352546a5ff9a8da4f3e38076eb91f0d0", @generic="c90c0c39c4b4e2f02d40b001d35cd119bec0ad17eb03c21544565be6dea66fd166ea9e6c55a148ac20a4223eba28076efff11e72b0c074ac4537843abf50d700dc26d66693848e4ff9ee8f03934780867b001f470bffda8ada02be27133b462ccd8db5aedd20b0d8359e1080179edfb03fa8db9cfeb9c80eb5", @typed={0x14, 0x2c, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x8, 0x7d, @ipv4=@dev={0xac, 0x14, 0x14, 0x6670977f}}]}]}, 0x828}, 0x1, 0x0, 0x0, 0x814}, 0x8840) r5 = syz_open_dev$dmmidi(&(0x7f0000000bc0)='/dev/dmmidi#\x00', 0x8, 0x800) r6 = semget(0x0, 0x3, 0x200) semtimedop(r6, &(0x7f0000001dc0)=[{0x0, 0x4, 0x1000}, {0x3, 0xfffffffffffffe00, 0x800}, {0x4, 0x2907, 0x1800}, {0x5, 0xbf, 0x1000}, {0x7, 0xfffffffffffffffe}], 0x5, &(0x7f0000001e00)) bind$llc(r4, &(0x7f0000001e40)={0x1a, 0x336, 0x7, 0x7260, 0x55, 0x6, @dev={[], 0xa}}, 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000c00)={<r7=>0x0, 0x1000, "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"}, &(0x7f0000001c40)=0x1008) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000001c80)=@assoc_value={r7, 0x2}, 0x8) r8 = request_key(&(0x7f0000001cc0)='rxrpc\x00', &(0x7f0000001d00)={'syz', 0x2}, &(0x7f0000001d40)='/dev/dmmidi#\x00', 0xfffffffffffffffc) ioctl$VIDIOC_G_AUDOUT(r5, 0x80345631, &(0x7f0000001e80)) keyctl$get_persistent(0x16, r3, r8) 15:35:30 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) ioctl(r0, 0x8000000000009375, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', 0x17, 0x2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 15:35:31 executing program 4: r0 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000180)='/dev/sg#\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) connect$netrom(r1, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)={0x3ab, 0x0, 0xe}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="00002bbd7000fedbdf251100000008000500050000005800030008000100020000001400020079616d300000000000000000000000001400020074756e6c30000000000000000000000008000400010000000800080003000000140002007665746831000000000000000000000008000600ff0000001400010008000400000100000800020087000000"], 0x90}, 0x1, 0x0, 0x0, 0x840}, 0x4004000) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x9, 0x101002) 15:35:31 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x90000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x4a, 0x7fff, 0x40, "0d846a37e5805c7061dcc3b2e52eb7368151cbc656201826a597073407e9cf8d829cedd5a4d48796e5112143d4f7640dacb16a38e740484037cc1228e85b171ec0aec4c2c3bca77ea1ae"}) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000017000/0x18000)=nil, 0x0, 0x194, 0x0, 0x0, 0x296) 15:35:31 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x8, 0x402100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={<r1=>0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @rand_addr="ce4d69df3423d9fb6e8cbddd0d2595ab", 0x9}, {0xa, 0x4e22, 0x101, @remote, 0x5}, r1, 0x7}}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) lookup_dcookie(0x5, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r2, 0x0) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+', 0x1}, 0x28, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='3yz0\x00', 0x1ff) fchdir(r5) arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) r6 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r6) pipe2$9p(0x0, 0x800) 15:35:31 executing program 0: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x10) setresuid(0x0, 0xfffe, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)) [ 808.560792] kauditd_printk_skb: 207 callbacks suppressed [ 808.560802] audit: type=1400 audit(1556724931.489:17530): avc: denied { map } for pid=23384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x9) ioctl$GIO_FONT(r0, 0x540b, 0x0) 15:35:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000380)=ANY=[@ANYBLOB="bc0000007800000054f72708e00d143341a08dd7194ab1db449a68561cb2105ed1f45e96dbbef1215cde486d2337f0c15f149e7b6f6538577c97ff36cbba801ae0b2424264673240445d2f3e9aa383d5f018bd3b85e4287ba5eab70993770a08d1cc709de28322709e4342a225948fc04e5ff3c06b462e0f257061acee84e9b397b6e168dd3f00e27634ad5ab6"]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, 0x0) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1000008, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d30783030303030303030303030303465add325cf713d3078303030303030303030303030303030392c646f6e745f686173682c61707072616973655f747970653d696d617369672c00"]) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, 0x0) connect$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x5, 0x8, 0x100, "3d1aa85a4adea919e7bfcee93dfcc8a105bcdad7dab25e33d4ee6d4b0d8de8bea247feac3f4b8ad73a0fe02e9f049366a4830c96d5c10e291a4f5cd331c3c7", 0x1}, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) eventfd(0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0xff, @loopback, 0x8000}, 0x1c) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x3, 0x100000000}) [ 808.795664] audit: type=1400 audit(1556724931.499:17531): avc: denied { map } for pid=23384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:31 executing program 4: r0 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000180)='/dev/sg#\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) connect$netrom(r1, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)={0x3ab, 0x0, 0xe}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9084c7afa35f03fbcece4da6d1f909ae6e7051acbf4f82ef451e1a6fb0ff2d0033069b389c47a7877c9e25e780670300043201158b8946e3cce5768604c07303d4696d5f729a28b79f3504b70c2ccefcb93cc3971a3e6d370a74d3c4032b9f10984248db2ce4869cf448e188c865b352a97e6347272c45c2172131e91f525017c740303cb7534262bb65a1c154e997f5b0de40c0f3c62bd26c1746225985303f7d97f872e7c3dd96e0acc495d5fc9f1871dcd41592794aaf8db94962c2fb2b2879df27201eca38cd8e73bbbad3552296d96b2e53b8d212424a4ff96d9ae76323a426f1c8e510c52d29495b68eb8d28fa381475f7bf1ad3595f2f4e3d8cd233422a7bae060000007126905834d50afc418636ed96af40bcdde5d902543342", @ANYRES16=r3, @ANYBLOB="00002bbd7000fedbdf251100000008000500050000005800030008000100020000001400020079616d300000000000000000000000001400020074756e6c30000000000000000000000008000400010000000800080003000000140002007665746831000000000000000000000008000600ff0000001400010008000400000100000800020087000000"], 0x90}, 0x1, 0x0, 0x0, 0x840}, 0x4004000) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x9, 0x101002) [ 808.935539] audit: type=1400 audit(1556724931.769:17532): avc: denied { create } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:31 executing program 2: 15:35:32 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x40000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r4, &(0x7f0000000380), 0xfffffffe) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@nfc={0x27, 0x9}, 0x80, 0x0}, 0x0) [ 809.101189] audit: type=1400 audit(1556724931.769:17533): avc: denied { write } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001400199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) 15:35:32 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x20000000002, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x0, &(0x7f0000000000)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}]}}) [ 809.336164] audit: type=1400 audit(1556724931.769:17534): avc: denied { read } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 809.366529] net_ratelimit: 24 callbacks suppressed [ 809.366663] protocol 88fb is buggy, dev hsr_slave_0 [ 809.378809] protocol 88fb is buggy, dev hsr_slave_1 [ 809.425589] protocol 88fb is buggy, dev hsr_slave_0 [ 809.431035] protocol 88fb is buggy, dev hsr_slave_1 [ 809.478273] audit: type=1400 audit(1556724931.819:17535): avc: denied { create } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 809.671276] audit: type=1400 audit(1556724931.819:17536): avc: denied { write } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:32 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x65) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={<r1=>0x0, 0xd, "df3e07b477738555f62ab5bfe3"}, &(0x7f0000000140)=0x15) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0xfff, @ipv4={[], [], @multicast2}, 0x80000001}}, 0x8, 0x1, 0x4, 0x80, 0x80}, 0x98) clone(0x80041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() sendmsg$tipc(r0, &(0x7f0000000500)={&(0x7f0000000240)=@name={0x1e, 0x2, 0x1, {{0x42, 0x1}, 0x2}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000280)="fec868a8cdd38f87", 0x8}, {&(0x7f00000002c0)="a05e4d6d425d35251490a7f4cf85ac843bf41ab8d7092fb4fc39591cfbbfc847a2c26f563f2aa8fb458356375945ae846568401b522221efef6fcfcc6ed0d806c7de9b2eb32eaa104ad16892f39c74c057ef49f05cf7ea2db1f72e47257f8ce7916cbe681d57fbd87b667f8e6f6a25ed00f4bf0c22503851686f0395c3e158393e40e0b19f6add31b4e7e54af6be215675b27e17c311a3ff510b4fdc5c99", 0x9e}, {&(0x7f0000000380)="7345b9d97740717d7d2b4e70d24e327026a59e552df0fd8f38b981168f7faf7d6a1f516762d22d44fd398c6045294c6ca894a5a4b62da35c9d21df07826d55caf871f867a7ede1f261d5b49478623dce93ce5acef9fc15e5376bdd5348a73756d3b20f2c96e4f122c66aa697dbbbbf6ecf912fe4267ed9af73d1d368e499d5959fde2fdcde06547f0879335d758c652ce8952481b52fdc110422b0a4517fc2243cadf68c10a2ba73991db0067ae793877b8614920caf6b5be7e1f00c372ba388861c532f2e934877be7b987f0affe857f248821a0386b20ffcb84a55c58a3d14a68cc6412a3907dfea0cf16a68b5e0cf245202f5", 0xf4}], 0x3, &(0x7f00000004c0)="61994f83ddfe6a97ad7e9040ab6cbb1d11ba139f1f56c1ff9521b42b4e9aca39b0f1d4570a47b40fe309f9a2a1ee88baaba9be062837da9af96647813bdbea", 0x3f, 0x4000}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) r4 = add_key(&(0x7f0000000600)='rxrpc_s\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000540)='rxrpc_s\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="1971aa0a1384afc2b8a10c7f0b221f0931d7830cfb28d6b7df9b262de0c6390cd1756524ce82095cca076fc4a4fb6af0c0184350d212c3ca28", 0x39, r4) ptrace$setregset(0x420c, r2, 0x0, 0x0) [ 809.825822] protocol 88fb is buggy, dev hsr_slave_0 [ 809.831148] protocol 88fb is buggy, dev hsr_slave_1 15:35:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x1, 0x80000001}}, 0x28) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) bind$alg(r3, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@generic={0x0, "39e2973127f5e3a1a5bfbb1ecaa5a46d4b5826bf3e29477aa83b930341931a1f25ab76245a960d63ad1c467c83c9e842abeb59bd851ff437263884dd641efc7cddeb22ac78ffe364d71d64ba2419fa41dcfd4ecc737cbc4d7712913083867f23221c0d0caea62d07f72e8ec980a45d10c57b55425bc426b453d4038d7526"}, 0x80, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101000, 0x0) [ 809.867297] audit: type=1400 audit(1556724931.819:17537): avc: denied { read } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 810.065572] protocol 88fb is buggy, dev hsr_slave_0 [ 810.070754] protocol 88fb is buggy, dev hsr_slave_1 15:35:33 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x23) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt(r0, 0x9, 0xffffffff, &(0x7f0000000000)="939365d0055324053bd73056220e989427b736802ac1fd110346c5331d486e4412d5968df496bd8b590bdd0ca52ebe31abac0238d6841fdc77ac3230396dc9ecacdc6b850e15bcfdd8f95b199a54525d114537f356410c2d59524d0e722ee029497ccf5dd37396c6c9a300dbbc5466df74ce80502a99c2ffecc6c61d559daccddcca118c0ef851faebe6288a2e4c", 0x8e) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x3f, 0x2) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 810.105388] audit: type=1400 audit(1556724932.019:17538): avc: denied { map } for pid=23404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:33 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/932], 0x3a1) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/policy\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000680)) exit_group(0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000150007041dfffd946f6105000af000001f00000c0c000800080006000400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000240)='ns/net\x00', 0x7) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x13000) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/net\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{0x100, 0xffffffffffff0001}, 'port0\x00', 0x20, 0x420, 0xfffffffffffffffe, 0x285, 0x80000000, 0x1, 0x2fd02678, 0x0, 0x0, 0x20}) [ 810.222719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.299807] audit: type=1400 audit(1556724932.019:17539): avc: denied { map } for pid=23404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.322129] protocol 88fb is buggy, dev hsr_slave_0 [ 810.322179] protocol 88fb is buggy, dev hsr_slave_1 15:35:33 executing program 2: unshare(0x400400fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="23b6f555794b884728a404ac1888f1d5e8c871c731c4fb03dcb175b9bb6697a33ff45c5fe28f82d1db77574852a2abc74988adc2fecb3665341190044af0a654", 0x40, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000000c0)="7ac1436e7dbe6b520530a084ac13a8f48decf79e565ae09dda882bd81db24b59df932c06e72dbdfd3f0b26271631b83f603e7cf847a9cef02b49dbf356f7be406d9f5f61751b7bab06b15e6c90d2443662e23956c8bb098b201dbc295d301eeeb99ee0ba0ee4efc4edfcef34351e37ce7bf46e3ba1fd29aa5156c7b56fd3dfaff755b8bb4edf847536e4db8a0f05a8510441943c2dc1d7f577c9f16e854056bfaa798390d34b027a4c80d53f4f63bcbaaf2fc7002ed687", 0xb7) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 15:35:33 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYRES32=<r1=>0x0, @ANYBLOB="220d050000000000a01c070066dd52c4d0a9e03ecc90419cd4ad000065c751df21289888e24eb84c0890825188c2ff2bda14c722592faf717797069f57cb9857e8dcdb1826fd9666684a52a4f270014a108e66343a3987cb6a58b8f252128e6fec3b537a647de3ebd7631cd79a57440daf7e412a77af10245313e5721664fc2240050f8c2000edd47f80347d675bdff41854cda484c6c0bdea343a77b87020a5c40dfedf3a268c428dd3708e40ef0c736fdc250fe5d80016eb205b52bfa020ac6343e726c434902e485c90501451505f6e9a41a7945d25a792bbd71e695810f96105b3b7885f5ced2cfcbf9df1eb6498f3a9c7f934f2b3da2249a32d4ccd6fae54731a2f0d2abc72d1a6c955c4fcfcf0d2e7dcad2f49c2a1c12667e7750b2a63ca58bb9022c6873315013db95509a3f7ed457e13d02cc9231458036a0a3775f87695abb429dbe2eff4100429ac250331c59d7e30fa8e6e983265af780fbcf62df49d644ae7efd9993fef23487739bfdd946d24777da2ea76f5f506131f2b3b9ab51e39d00d4e69c85065f6d7e6b75e6767176e8e66dc16bbb4b85e4ef2fcec15aa2d25"], &(0x7f0000000240)=0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={<r2=>0x0, 0x1f, 0x0, 0x5}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r2, 0x0, 0x5, 0x9, 0x7, 0x1}, 0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0x8, @local, 0x20}}}, 0x84) 15:35:33 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xfffffd95) clone(0x180000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.u\xe0per\x00', 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, <r1=>0x0}) mount$9p_virtio(&(0x7f0000000040)='trusted.overlay.u\xe0per\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40000, &(0x7f0000000300)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x8}}, {@posixacl='posixacl'}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.u\xe0per\x00'}}, {@uid_gt={'uid>', r1}}]}}) [ 810.929783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16381 sclass=netlink_route_socket pig=23444 comm=syz-executor.3 15:35:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x18, 0x29, 0x39, "21020201"}], 0x18}, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)=""/26, &(0x7f0000000040)=0x1a) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x1364, 0x4, 0x8000}, 0x4) dup(r0) 15:35:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2c6c6f7765336469723d2e3a66696c653044950f8e510676d31bd262b36297fb0438ede4ae7e8a40ebca3edd9f0fd05816d86210c76f2c534b4eef8c1d8dc1945fbdf5a8d6f6f8447fe411e00be093f49800c5179a26dc7734cd091b7350dc2ee4d8e993155dda7640174292d83612e9039425c9ba0ded3595325682e3d34103afabd5553f"]) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200c28, 0x0) [ 811.095062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16381 sclass=netlink_route_socket pig=23444 comm=syz-executor.3 15:35:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xff5, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffbfffbfac, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', <r2=>0x0}) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f00000001c0)={0xe, @output={0x1000, 0x1, {0x9, 0x1}, 0xb103, 0xfffffffffffffffe}}) sendto$packet(r3, &(0x7f00000002c0)="75d2e51e81a050bd80c1daa23f8efffc62dccfcaf55e3e0bdc7f2496dc67014eb4a7af9b90d2e9908d1e683c1a44ad8afd5a78795544cd860d965a7f465930a8539ef3a32ad9d078edd88669aafe7c6662dd88acea4ad873a4efb4a6f1b91ebb02672944817a9031aaf3c3fd0aaccdf109f557d27889a0da3e0a29f862daca20b033d633660bee2bf2a8ed8a38495d5855992bf717460789eeac3e8975229bbd76ea2755a668716b30072b99a7ab8f34616120c4a6dfb503c5d658329192356bca9552dc8e02e2d9d26788c2c36048e31c8ec4b047e1c8acd1d3c57ddc063086a49a76d6ec8a21612069f467b67a54dae483da957f31efda8049c33d2f30c9ac8f0375dae90678fb00264acba4241a29e490359094a489122778b727e1380f7be06ddf1b8ea3259b124c0db729413707a2d9acea72c1290b9f26b38ff451c5d74cfb6c7bc01b78ebcf7cda6c55dce6243f11294daf07e576a7ab0a3115ad3652eb81baff581c7b12e16edb61825c3f2dd1be65023edd942b86fd50d442419f24321622b024c59713081e34727531379e9346f9a0d667e7aa8059876259b99a87f2179817bedd645c279a7a1a5487afa9b5c8e5133ccef29fb7f26415a3a0981bddc04b599feb80d66da6c559c3898fb4693a2f23c57387be94e9da1445d996ce8a015b870177f1fbc72d62edac0f01fb61c4a2039ba65a88c0bcd15cfedfc6018b3d22bc8df5e9b1ff713ac99b80afae2327f7e4f1c43b589264055db85f5c45773ba08b7cb152237a7d76b1bab0bc30df70afdeffbccf4ea0c12b6bfd8f34e1a770a1b593f47707ecc3396d9916b415b0933165c56e7e46a0e082da42bb625cf6252fabedffc46637814d4ac015a9992fba4caf5e972858920504b7c884abf3d4805af6d4276e224aee3a6b19f0cc9d7eab9078f4f24ba5a9629e7bcca5da8a3c87e9237aa7dfd48306c23260d51ffc647ac383629650094bdb406bd47342b111df0d678dcd009d937af06fc17192a1113592c3e23fc5bee1969f28338eaa3fe8406d952fb39e7a678274135ea232eb68b5f872cd0900dfa806b6d71047cc78e6881a486c0d118a90ec5679078e142762ab02c89b43f9af8857a3cc5cd0ec7a44750386e6d39d0dbf1a27c8bd004378d43bebe86c445d23f640fb53b8ea3661ca56479b69201ef0b79428e1e651691865820620e782cef750b000689d63c34419256e1a6c3d6a7f6debab27fe5ce546ed2cb5c44f7612ecdeefa92f82cf9089070fd6da5283323aa4a0bd2ef9008b4dcc806bcdb7fd330d48fd7d2ebcdec81999ea2650936cdd1b2284cff357b3ca1a9c65d4982b5f1e87808e38d7df97280b7e1e791c9fdea93278273dc3c813a0137077e14b4421f9869be44f33b06195c4b833e5b7897953cddd1509145a6b2c3d85e1e144fc165e1ed3efe4cdccf829240201cdb64f3266277922210b5ebff18140cc9b57175facc97df401f919a0a9f2e7ad05a1b41c1967564eb06756eb8556b47399c8f96e9232f79a2f6ca253cfcd7a2fc2ed5f5d402550592da862bae697256d59e342c3a8dfad89f027c1ac52f456883e9416d034cd688a799be94d11e76c110a60dea796fde4724863865aa15d828db83175a29a8d6a55a164df3f0070fab6eed59722d2d3fccf0cbabd2ee233be6e36fec12f0420d0826b174571f478adca50ebbf12b37efba55e11aeba10c13fcb11c198f0c65509ced8f8ec893057c5caced8b3c7363b377cdf054774077593ca6eb673b2444375d54f68237dff137048acdaa9d51ffc307b90d6b934f668c56f055becdceae125952244a2ecf58e9ec684304da03bb203ba8ef57ea17103614d33292517fc40446d64c36aab42bb277971e7e179dbfafdf576e4f5002a6d962209c87c97e8f9b46cae8d0ed53e388372a190f75f3de92b07313df02e32cc2040b5c5f0544d39cb0302f8b5d5d3b4a05851dad71080bd250c56d66cd5c8555d7097f1337cb555170b3b0664c9d375986e752576d3c691cd65a8594e15a0cac6415257f5b5128a6724b1f20c274747b5c48f1d80902655d1d1eb087a09b50d9d1ce5bd2929922069a6cc5d6d9400fdedf4906038aadda545b2fd5bc87d1238669ba4205ce602dadcf4abd906d3c1d4f6ff9726b3a7c08c41f3030b46eb9699fe96993f4786f04281ff6ee889844f92cd990830bb0a636a705d6c01dbcaf773ad18e2240ef7d3b3d9417d57091eb4e27a4398784b1e9e972493a014240070faee0c30fa613447b8100709d150213eb04f776706dedab6bbe9993a7a8638f9413a5129f1c25d87b70c4c1390fde1b07398bc97cc249d1dcb2ecdfd1c995fc7bb62a5f905f7f077d60bd674acc1f22b7cc9f639905fc6aeadf04778de5934974da55b5cd583b6f917eafa0d0a1435adc6371f25941a9e95bf13584c739e5e1c9dcff458a5eeb55e8fdf4b6cd4568cf0221fa77cc464c0267693b20a53b80ff1838ba6260503d23747fae617dc9ac8ed0dee54703b422eb9feaae8af6908e80680422cfd5955b8c7910eac0a497d3b6444644e825851fb04ebe7e0101da29a458e5edf5aa02181606d384956598b0c22bd3d7bf095ec44330a30b947c5cc109348ace8f90c2b8f61136d73fcc3922414e0429ae6dacf80317733a1ddc3054689031f55d353e3c9bcdb500bdddd677cc79807bf817791fd0f8b719a4291326ee411c1cce5bce421dd6238929167c8db1aee34d38ddb7ed2eb75cb82ba69adec60c29fd2beb52847c0631a9ed586b3976d1ac046eb5335c09f241f1c38fd394701ce07ede515e868d760c2165102497213bdf620cf30b56e72839c3621d8aa1ee24e92b698b0401a163e82ceb86e1d8c858af101cb9cd9ca6304ada34066f23b93b44e40ac66f154b820235cdabb915030bc44d14a7ee97b0d9962f9b5855232490160490bac81e41c6e92b43d7eb1a3983382ee3f934bfe26a52035a41ed69d448959e29c4d7cef1f0fffdc934d998ee58948440eadb3ec1ba206717f43af28bd1277dbda2d61bfc3b276a289674754d9579c27858e5d47342c39bd0cb9a75eef74b0e9e3906e64b1e9cceff24cb0e7515f54594430db82b902f5d8a6b66838d509fb65ceee0fc68afc7cd5530a8aeb9caf3a06d99d8fdf03a9fc54195bbfacd8a76cea37aeb0bd77ab7132ad35dfe9ba9a8a9eba0ab30633052ebf33ea61112d7662ef26c6212c447e5910e3e2cbd69bab45cb47f876efc80685faac12a3b4d92ae54dd64e52d2e14effbaae549ba002cbd474d5c7048614cc796fcf791aaded00b09d773834470bede4cfce0b11435568a9dc0d706ca85aaf219c08f68ea32623d9a9f443658245218b37123fe7c4ab33ddca1ede7b35edcaf7af459c369f0e28b6459e64657b7d2a4f10bafd7e136d2160fa342c2866abaa9287bf2b028ce33736f7c8a70fbdb46c758f1697c6ca1c2df0a17fd0d5a26fe1a313b5be5d442ffd484d666fbf3c952676f29c38da7c1918a4e23f9d6f413ebe9d5a98595114eebc040d59bc674bba54b4da3180d78645e066ee62c9acbf48e846b4c3dfa4c4fa7b666f5b9e2c91686c97bf27fbc57c00624af0cba5980da11000147a90ce2b993a7e048170403653e2a55a8160a910cf9a71d1a00b0ef2f7006b38b8e79b9c6e09b8b989bd30dce7d6e3ca7218eb2e6ae3217fce2da7a6cba82305a87829f492e71f428c4e8b82e6dd7eda0b2582142e1825a445cd0dc987f3c4cb9d057b7a78f97489300f3334561126d26ad6ec675c53f900c487e07314e02304960d2fc715cd6b6ca6b51044d53d5fd00571cf9abf6626768a13a53662d4a21aaeed350b53750f8ceefbbff5b16fbd36614e4c42cd784257fa195bdbdf9b97f6354c61988e90f47e0fa15d32f3b56026c2dfae2a6c8be48a9cb7039b78f311c194d9dfc7fbf6c94a7ed12d5da815d8380173c6f5244fd5aaa03720e5935e453e758f339b86fbc718deda6b23091ee5541f057c6bdbd34157a1104f43df5037beb6410c82b73c85a88051c8859d6932186e98d15637f8a872c43dc364e1159616b5d32918a4cdd34746ef59ec2525b807e8734fc49fd7b3663b033d53896cd72becaeda5c3e1466fcf397a0ef1787ae732038a57d454c6e495135954701cf81f54b8584d9670cf17139f8cfeb60f8aff20fa851852fbfaa78dd135d6bf4f6da67c69415f6be990f1abaf096eb57ee0bb55995b1e13e313f2d6b6a31acbfa91e03d297ee5b6a84bee0bb6094d9062eac51f3b360ceb9ef8a28ab380709dd863c2052c46b9162a382ad31ab75b707ee8228595ba3fbf4eb98491a53739d3f4b298df75eb7f6f36c9c3b196074b60b0950e177500c4cb42add07b64d1ca9e1a6797dad70196a28e0e19b14085c0a97942a683f8ec752621e2ae7712c10116ee41ef6f7135ccbd29d680411f0ce2cd079d5be127a502a7aeebd9eeddffcfbfc25393298b79ee8ff1edb34d67b3990362ec7598b96bfaaf6afe50608018a97ef83c0675bbbd51487fe05f70681117d1ee599f30e36b3efbd898cbf9ee09f9a9384fe576a389ce46c4e0237c66896444872d1e68c48a8430ee33e54e8c7b91ede1cb9a8bad40f29dab2bb703d9f9f87bee57c89dabefe4aae648582689bd3a9b92933425f237a769c255c31debb7ddc463c564291225e2bf7881a0cc0d7e2d88baa0831158f66f77104788745d949250cfd828adb44a0856e36c49755753c5352a3ff852ed9e89adda8a9eda8147f0f5e42cd3b5c5b9a86f60c6b7d5317a3d5fda855bf421e56c2482c68a8b89f8ab927461d1f6abd09801aa847083b32d5618a15b74b4d4516d62542079c795802061ae27a5838142279bc40767d4526be19e06ded7d9a981977e67b586658d0872701229b2eff2c120c0c3071ca35cae5f392b5fb4ec7384f57bc91d0d3aef8ccc4c04c8be6cabafd3cbb20b53d3a04bc20b0209ebe9567a4e65774e031ec88b7d1a68c8fd9e05f52557548fc0ca6d2e7a0563fdbc70e5e9866579fd5be7b388733a1691c42ebb1a8aa35469d39453c2672d221a31cd6a6181cc506a3d4fc57c239c6975f61c6c770a529b132e3f1768608ce2b005522c99f0b0a2c1780f8ea4e4282fef5f3398fa7a28a68d15426af1d5d969b621f00c8ecfc2978b99c29c8cfabc380d1ae1ae51a4aaee07683fc2b3cca0550d4147d21b3fdedb7e46168afe9e16bdbf72e9b5a92ca01034abee99502e4ac935f27c9517f4a599ddc8a86a23055ad0bd62c0c62ea7c951063c99269e2f50c1f1992425cf7e5a9743582ba03f7b56c68730ec91762ca467a30bdb2abf3c9eaf97f239d69a2fd5a97548cb87495f34e777a295554119b963d7be8327620a75466f3ea95b674d9537b40038db74f0585f032eafec24d56efe35e739f1ad31bb7a0c1867b879515f9387d64a2db806ee5a40730647ee92600035b8b9cb675a156803f1936d6f04b58e4226f8291fd44ee4bb5db1421134d6f8faf801bcb93086bb5415416b40544c7e699af10a38c6499ecddf3415ef4e48544847a740ba05b55cbb1e73d81dd8b4f2667bb5c455049c788dbb0591ea72233b14f39d7a5033b846b60260884f57073aaf0f3d269a5612779cfbc8363d87557c41b2fa22a772efe03cb184b622533a9feb91b691d22093c293e83504bdc128df17d70b5906581ca24b3c153e0ed880d4e16a916b5b10eab6452b738c0e25e3dd1159ab2768e75613cf414c26ecbf717efa3d3b9b99e21c9ef95f316a8c2800ac44676cd72abe2bb813ff9234e1a0ae7c0", 0x1000, 0x4000000, &(0x7f0000000140)={0x11, 0x17, r2, 0x1, 0x100000000, 0x6, @broadcast}, 0x14) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'team_slave_1\x00', r2}) 15:35:34 executing program 3: syz_execute_func(&(0x7f0000000040)="982ced0f050520d0f80791b0024141e2e9964180bf108a6796fbc4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac100000ad808f294001b00b000000f08171a38a806ebb15c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4e7ae3131b15dfba1c9fb110f0f3804830a000000") ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000100)={0x0, 0x4, 0x9}) 15:35:34 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000001, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000000, 0x10000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={<r1=>0x0, 0x7, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @remote}}, [0x6cca, 0x400, 0x7, 0x4, 0xfffffffffffffff7, 0xff, 0x6, 0x7ff, 0x39, 0x80000000, 0x4, 0x7fff, 0x4, 0x0, 0x10001]}, &(0x7f0000000200)=0x100) r2 = socket$inet6_sctp(0xa, 0x2001, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x1e, &(0x7f0000000000), 0x4) 15:35:34 executing program 0: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) r0 = syz_open_dev$binder(0x0, 0x0, 0x3fffffffffffd) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x3, 0x101200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000100)) 15:35:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup(r2) accept(r3, &(0x7f00000002c0)=@l2, &(0x7f0000000080)=0x80) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3180d070") listen(r4, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = accept(r4, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, 0x0) r7 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000040)={0xd35c, 0x0, 0x0, 0xff}) ioctl$TCSETSF(r7, 0x5412, &(0x7f00000000c0)) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000100)={0x8c3c, 0xf346, 0x8, 0x1, 0x4, 0x0, 0x591, 0x1f, 0xb28, 0x3, 0xc2e6, 0x3f, 0x3, 0x8000, &(0x7f0000000200)=""/177, 0x8000000000000, 0xfffffffffffffff7, 0x1ff}) getsockopt$ARPT_SO_GET_INFO(r6, 0x0, 0x60, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x44) [ 811.654144] overlayfs: unrecognized mount option "lowe3dir=.:file0D��Qv��b�b��8��~�@��>ݟ�X�b�o" or missing value 15:35:34 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) lookup_dcookie(0x5, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) mkdirat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x1ff) sendmsg$key(r2, 0x0, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xffffffffffffffd3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000003c0)={0xffff, 0x8, 0x0, 'queue0\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0xc0f7) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000200)={'ipddp0\x00', {0x2, 0x4e22, @broadcast}}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x80000000}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') timer_create(0x7, &(0x7f0000000240)={0x0, 0x35, 0x3, @thr={&(0x7f0000000540)="2ab14e4b31472325e78639795e9ab5b0267fd844ff16a3efc63bfc8999cf856f6002ed116145f771d63baecfb1e5fe65add3131f81b646a5e7285a113ebca50448caca7153e6209e71d15dc2534f1be6aaef8b570c003f19995ea20b8b1b09b70b3cfc1a5c9b3de3cc3c8137680177aceb61077ab9363c9bafaa41e382d74f0e8d6cf53f470079c528174b2e8f091085186185177e69b95f35c98ce76724f5e3751ee88a3b2d2dfe524aa709adb8f1a9a4fc7e16c866be34fadc8221d0f0d6ed627fe2d5577e7f916fb843b6b412868703784e4cb8ed458bbeb7d5320e73b39ad3587309c9c2bb6ca5fb038d6d6d3284807bbd46b3b53747", &(0x7f0000000700)="31ce644e9ef87feb5ff08cea2f283c6a29a3f1208d469a41fecb4d12b72d533c7bce744ebaf4ed6671f40fba2f546027da7ddb2d7a54e546728bd55098cd2b0760b6ef67dcf1fcfa7bdbdefc97eeafb036c197da4d267c7c19ab2a8b23d9f63cbee85bd310571e997c4bdf6ae57ac0d871c70e7fe12c63011849fec6b411cb3f4c50b4649cdf945fc19522535fa5ecd38066d2222b211a5d72b0fc90df47f33cffefe3e9fe0e26af9cc1951e6b6de12ddf9e9fe4d842b3effd24eda4bb73b3869c1e6f26bda0bceb21ea81205c56c4cc1714e799996e6d44284b25f12a742a3983b0d860a092eb38"}}, &(0x7f0000000300)=<r5=>0x0) timer_gettime(r5, &(0x7f0000000800)) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) r6 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r6) pipe2$9p(0x0, 0x0) [ 811.772631] overlayfs: unrecognized mount option "lowe3dir=.:file0D��Qv��b�b��8��~�@��>ݟ�X�b�o" or missing value 15:35:34 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)) lstat(0x0, &(0x7f0000000880)) lstat(&(0x7f0000000180)='./file0\x00', 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101200, 0x0) rename(&(0x7f00000003c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @sack_perm, @sack_perm], 0x5) r3 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x6, 0x4) lsetxattr$security_selinux(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x0) 15:35:35 executing program 5: r0 = syz_open_dev$radio(0x0, 0x1, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) io_destroy(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = eventfd(0x81) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, {0x2, @local, 'team_slave_0\x00'}}, 0x1e) poll(&(0x7f0000000200)=[{r5, 0x1000}, {r4, 0x4000}, {r2, 0x4000}, {r3}, {r2, 0x2}, {r3, 0x2477}, {r6}, {r4, 0x1080}, {r0, 0x6082}], 0x9, 0xfffffffffffffffa) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x80) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000000)={0x9, 0x8}) mmap(&(0x7f000015a000/0x2000)=nil, 0x2000, 0x2000000, 0x40001f, r8, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/128, &(0x7f00000001c0)=0x80) r9 = getpgrp(0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, <r10=>0x0}) kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r7, &(0x7f0000000300)={r0, r5, 0x6}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 15:35:35 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000200)=0x8001, &(0x7f0000000240)=0x4) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000080)=0x100000035) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/162) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffc, 0x0, 0x20, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x7fffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f00000002c0)='\x00', 0x1, &(0x7f0000000300)='^%\x00') r1 = inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0x40000002) inotify_rm_watch(r0, r1) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x2) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000000c0)={0x8, 0x7b00, 0x9}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) 15:35:35 executing program 1: socket$rxrpc(0x21, 0x2, 0x2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x407e, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x7fff, 0x8) syz_execute_func(&(0x7f0000000400)="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") 15:35:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x8802, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = gettid() r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000000c0)=0x7fffffff, &(0x7f0000000140)=0x4) ptrace$setopts(0x4206, r1, 0xffffffff00000000, 0x100010) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) getpid() setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180)={0x29fe, 0x2, 0x1fe000, 0x5}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) fallocate(r0, 0x9, 0x8, 0x6) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x1040000) r3 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='/dev/uinput\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={r3, 0x7f, 0x9}, &(0x7f0000000880)={'enc=', 'raw', ' hash=', {'crct10dif-arm64-ce\x00'}}, &(0x7f0000000b00)="e320c62d3fe6546b0a6e4d58919c2bd794dfa9374e1eaa445925ad244595d5c8e6fb1935da4eaac47d6aa6616ae4b2e875ecb21cc94d643d369c2332d0c0166f92e3787afbe872ad79ee494b8cb594e79d426cfd65dc99abc289d4c9c09a680cd22da68aba0fa87ae578af1d0c24f99074d3cc50dec5f81a9f5d762c18c39c110adae2bfb00a712a62abf4e96946e6f0448abc8389d1427b984b0b83e23f964fade0aeab4612061d6bbe87b3e0947c2a8d4ccac5c80301226ec8572511c6537484aea9b56c2245055366c3dbf3c3b477135837dd3aecb4b11ae2", &(0x7f0000000900)=""/132) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) write$FUSE_INIT(r2, &(0x7f0000000c00)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1d, 0x80000001, 0x1b3f2e763b254986, 0x0, 0x2d, 0x606, 0x4}}, 0x50) fcntl$setown(r4, 0x8, r1) accept4$rose(r2, &(0x7f0000000100)=@short={0xb, @dev, @netrom}, &(0x7f00000001c0)=0x1c, 0x80800) 15:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_cmd={0x0, 0x0, 0xf00}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10400, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f00000000c0)="9ec8a11ee30ea1d6153c969d5b85e493f53bde5f87290e38764bcf6fded9b8619f843bd2b015177a096cd6c870a5d7582494e20ddb58ac17e2b660b6ee58b040d9afd62a96c7981792d6c0dac3ec809d621fd2ea4fba792f649a67b3b26afb4d2867631ce25bfb018dde9d48971cd0ca7b6eaf4f0a41a468d7a5d4ea39646a0d31c8cbe10df1ac43a407e370a60eb9817d32ca1b", 0x94) 15:35:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x248000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) write$P9_RSETATTR(r3, &(0x7f00000003c0)={0x7, 0x1b, 0x2}, 0x7) write$selinux_context(r3, &(0x7f0000000380)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24) connect$caif(r3, &(0x7f0000000100)=@util={0x25, "89280cf64b73891306223e5259c3f01e"}, 0x1dc) ioctl$int_in(r2, 0x40000000af01, 0x0) setrlimit(0xa, &(0x7f0000000880)={0x5e, 0xffffffff7fffffff}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={<r6=>0x0, r5, 0x0, 0x18, &(0x7f0000000180)='(#vmnet0vmnet0-ppp1]\xc8&)\x00', 0xffffffffffffffff}, 0x30) move_pages(r6, 0x6, &(0x7f0000000280)=[&(0x7f0000001000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil], &(0x7f00000002c0)=[0x401, 0xed8, 0x0, 0x4ea7, 0x4, 0x0, 0x3], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)='nodev^\xd5\x00', 0xfffffffffffffffe) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) prctl$PR_GET_FP_MODE(0x2e) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000000c0)={0x0, r4}) kexec_load(0x8, 0x1, &(0x7f0000000340)=[{&(0x7f0000000600)="433b662b5c4713695a41a5e5ce50a8ba12eb82a2da65bd4fcdfbdd000511e0231a0ec7e68bedc08d294d1c735047ec07da51906b9e3922a22a7d62bf49f2e58f09b2dfcd0fd8488301c1cdc406690fae52786581dd9dd3c05f410190104ed29acbd22948d894fe04db64111ad6420ff89bacfea35482d3e5113124718e9d69b8201eeb772b9a74ec4f627255a311fbf47d9e805824f8802b20138aa2e39f1d295e244a4cdfc7326a4a52a9db0ea80a888371ebcf12d19ce0ffd85f9e33c695fff3de236ce86700ccdb6b06fe5147a632718dc86cdb6e66f7e5533cb9fd6c401d9b44c599b3ee83183afb53a42028", 0xee, 0x7fffffff, 0x3}], 0xa0000) 15:35:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0004060b4f43a49fe4a5ea4c000016179707fb0f3d2ed90920511c827507000000162d786893c44a2f2a0bd2a268ba000051df6d1e4c6344b8b39ba2f533cdf5424294335b7189c3003b"], 0x3e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xea) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101000, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f00000001c0)=0x1, 0x4) r2 = dup2(r1, r0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xe4f1912819ff9083, 0x0) 15:35:36 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) write(r1, 0x0, 0x17a) 15:35:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x400a300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000100), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x10001c) tkill(r2, 0x26) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) 15:35:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x4, 0xfffffffffffffffc) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={r1, r1, 0x6, 0x67, &(0x7f0000000440)="b21f5da460dfe6b4adfe020bb2fd6deee2b57319c43bca411cd1848d4cdf53a8ede7bf974d04137502e01f3d6af5835878a0b358cf3cb646b7b98741ee9abfd52abb95145b8c7201afa788ee0cbadd4bdd05c09254b29d1b4e94c690f68a4304c2ec13904747d2", 0xffffffffffffff81, 0x80, 0x3c2, 0x6, 0x401, 0x0, 0x5000000000000000, 'syz1\x00'}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000380)=""/175) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000100)={0x200, 0x1}) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20208}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x0, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000600)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @rand_addr=0xa3}, {0x2, 0x4e23, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)='bridge0\x00', 0x1000200000000, 0x8, 0x8000}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x40000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x10, r3, 0x0) ioctl$VHOST_SET_VRING_KICK(r6, 0x4008af20, &(0x7f0000000340)={0x3, r1}) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000580)={0x1, @bcast, @rose={'rose', 0x0}, 0x7f, 'syz0\x00', @bcast, 0x2, 0x2, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, 0x0) [ 813.610331] kauditd_printk_skb: 154 callbacks suppressed [ 813.610341] audit: type=1400 audit(1556724936.539:17694): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={<r2=>0x0, 0xd7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0xc4, "65d5c663bc907465a1204780987d6e0fb0c9c1d1e9a85c6f060569881c490c4cebcc92670b9ec19bb625f186c1142ca5e431e9f1b0992704960dce8e6e91c03cea87228d1b7f54c8d79f407394fc74867dc5e68f3e0fa658ffe8f6a157a84d1e23914852c74d6ec7d2c52a8d0039aeda3dc8f72152e0992a0b0e6a6f8fbf7374b6ea3936bea91759fce8720637dae4f475f8ec629eea231b21b28715c99b06e62979a181b3c87a8984531657174a5f16e23c36413ba30231fba67e69ccc7ab87c2bcda18"}, &(0x7f00000002c0)=0xcc) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0x81, 0x100, 0x4, 0x81, 0x1, 0x19, 0xf, "f0c09bf0324e191170f3b3e177dcc73b8800fd11", "6bf6ec8cb059d09b02b0a4b58f4f0bca94ee997d"}) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @broadcast, @empty, @link_local, @empty}}}}, 0x0) ioctl$sock_bt_hci(r1, 0x9ced041bc566e448, &(0x7f0000000100)="a457271dd00697a74eee63f6260563ac8b29c4ea1942c058c98cc15e79011803b76e138390edab0d6280b3336295d4924216ee307401") [ 813.834792] audit: type=1400 audit(1556724936.569:17695): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='&Vcpusetvmnet1\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r1) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x8, 0x200) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000380)=""/121, &(0x7f0000000400)=0x79) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e00000014000000000000009500000000000080"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) close(r3) [ 814.021557] audit: type=1400 audit(1556724936.579:17696): avc: denied { map } for pid=23517 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x140205, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x5000100) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r0, r2) [ 814.206827] audit: type=1400 audit(1556724936.609:17697): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0xffffffc9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a91", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a3041859a024217618edc55b89c6033fa80a83e60b1134ea18c7451ca2cf7bb4e90b879d8b2d959a2af6d046b92ed9886a6eb31349511021cb22b3f9aac9e8ef91fc7dd62827fe55f45b8d28d92aa04d579a49e1178ba598fa14f0b2203a01264f35c8554b2acfc1a1ae03fd7c68eb68614984eedcb2bd50dbf9dbff7ff"], 0x80) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffd8b}, 0xfffffffffffffffe) [ 814.372326] audit: type=1400 audit(1556724936.609:17698): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.465538] net_ratelimit: 26 callbacks suppressed [ 814.465544] protocol 88fb is buggy, dev hsr_slave_0 [ 814.475751] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24040, 0x0) write$rfkill(r1, &(0x7f0000000040)={0xbe, 0x6, 0x3, 0x1}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) bind$ax25(r1, &(0x7f00000000c0)={{0x3, @default, 0x4}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) keyctl$join(0x1, &(0x7f0000000080)={'syz'}) [ 814.537229] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.543534] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.560953] audit: type=1400 audit(1556724936.629:17699): avc: denied { write } for pid=23509 comm="syz-executor.1" name="net" dev="proc" ino=86824 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 15:35:37 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xe, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xe1cb, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x1, 0x0, 0x104f37, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4000000000007fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/122, 0x7a) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 814.592875] audit: audit_lost=191 audit_rate_limit=0 audit_backlog_limit=64 [ 814.606885] audit: audit_lost=192 audit_rate_limit=0 audit_backlog_limit=64 [ 814.625579] protocol 88fb is buggy, dev hsr_slave_0 [ 814.630824] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x0, 0xfffffffffffffffb, 0x1, 0x7fff}) [ 814.705553] protocol 88fb is buggy, dev hsr_slave_0 [ 814.710701] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8000000008b0f, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2100, 0x0) read$FUSE(r1, &(0x7f00000000c0), 0x1000) 15:35:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'rose0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x2) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f00000000c0)) listen(r2, 0x40000000000001) setsockopt(r3, 0x0, 0x4, 0x0, 0x0) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x40000) 15:35:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x48080) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) accept$alg(r1, 0x0, 0x0) 15:35:38 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)={0x1, 0x0, [{0x6000, 0xfd, &(0x7f0000000400)=""/253}]}) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[]) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000140), &(0x7f00000001c0)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000003c0)=0x3) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0}) 15:35:38 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1, 0x0, 0xfffffe6e}, 0x0) 15:35:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x401) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) gettid() timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") [ 815.520544] dlm: non-version read from control device 4096 [ 815.585545] protocol 88fb is buggy, dev hsr_slave_0 [ 815.590708] protocol 88fb is buggy, dev hsr_slave_1 [ 815.617805] dlm: non-version read from control device 4096 15:35:38 executing program 5: [ 815.665589] protocol 88fb is buggy, dev hsr_slave_0 [ 815.670721] protocol 88fb is buggy, dev hsr_slave_1 15:35:38 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac1414", 0xf}], 0x1}, 0x0) 15:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000380)={0x80000001, 0x0, 0x0, 0x0, 0x0}) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 15:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 15:35:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 15:35:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000480)="800f00001000110019000300e6000000ffe00102000000000100000009000000004000000040000080000000000000006d5ebe5a0000fff053ef080603", 0x3d, 0x400}], 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 15:35:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 15:35:39 executing program 1: io_setup(0x400, &(0x7f0000000300)) 15:35:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100), 0x14) 15:35:39 executing program 3: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x34) 15:35:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') 15:35:39 executing program 0: symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') [ 816.927249] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.079919] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 15:35:40 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4610f6ff000000000000000008030003000000df87000000003800000000000000080000000000200001"], 0x2d) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 817.210803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.292749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.357498] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 5: io_setup(0x80000001, &(0x7f0000000040)) io_setup(0x3a3, &(0x7f00000000c0)) io_setup(0x3, &(0x7f00000002c0)) io_setup(0x80, &(0x7f0000000080)) pause() pause() syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f00000004c0)="3666440f50f564ff0941c3c4e1a570f973f3430fbd91001000009a69000000803a8e16649d635100617b12450faeefc1dff89600c42211c40228f7881d000000421947a800010100") syz_execute_func(&(0x7f00000009c0)="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") [ 817.444461] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 0: syz_execute_func(&(0x7f0000006080)="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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8000000008031, 0xffffffffffffffff, 0x0) [ 817.555007] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.606522] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.708729] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.754602] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 1: syz_execute_func(&(0x7f0000000b40)="c4e379614832074a2be92c7e93984f0f0505410f57f0c4a37bf0c50141e2e9c443257b6700c266d995f2144006262fed660f0f5165007902000000e2ececde1b3c61dc57b1e6c100000082514654fa00c426660fc777fed6491e2f16c54cbec5c54d0f2c718f56ee6470173a1c5856d3d356c422652f2a66410f65162888c4e17810e366410fd1e426660fdf53098f69609b56875a79262638c4015162283e660f6eb45b0008804166470f383a799fd8a1a12ad764c4213a5ffec0c0420f403b94643619ec0000f438300f18c6400f38253d03000000c4c2801d9c96c9e8e9362665eb594646c8009ad0818194d8007a092ddd8f2b0b0000a17ae64295007b1cffd2fb2e3664646626468396b9080000000d900df82e4444dd06e8e8b2aac42bb2b1c7afa204c0414c598374fb590a0707ddacdd58ededc4e25900510166440f3a4440df757565d78047910002734b57ba47ccc20546e62c2667f0460fba7c1504cb439b42a7f0291280200eddefa9bb000042c4a37d790cc301d53131c4a27508313bec") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8000000008031, 0xffffffffffffffff, 0x0) 15:35:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x21, 0x0, &(0x7f00000000c0)) 15:35:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002480)=""/4096, 0x1000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(0xffffffffffffffff, 0x7fff, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) 15:35:41 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:35:41 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:35:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff0d, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 15:35:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, 0x0) [ 818.622015] kauditd_printk_skb: 271 callbacks suppressed [ 818.622024] audit: type=1400 audit(1556724941.549:17969): avc: denied { map } for pid=23681 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 818.778049] audit: type=1400 audit(1556724941.619:17970): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x2c2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x40505330, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0xc0bc5310, &(0x7f0000000400)={0x0, 0x0, 0x0, {0x0, 0x989680}}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 818.948037] audit: type=1400 audit(1556724941.619:17971): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000180)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100), 0x0}, 0x20) 15:35:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x209) r1 = dup2(r0, r0) write(r0, &(0x7f0000002a40)="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", 0x771) write(r1, &(0x7f00000014c0)="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", 0x78b) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14}}}]}]}, 0x54}}, 0x0) [ 819.112410] audit: type=1400 audit(1556724941.649:17972): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100)="ab", 0x0}, 0x20) [ 819.281165] audit: type=1400 audit(1556724941.669:17973): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.437716] audit: type=1400 audit(1556724941.689:17974): avc: denied { map } for pid=23685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000d80)=[{{&(0x7f0000000340)=@ipx, 0x80, 0x0}}, {{&(0x7f0000000b40)=@xdp, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/164, 0xa4}}], 0x2, 0x0, 0x0) [ 819.554891] audit: type=1400 audit(1556724941.699:17975): avc: denied { map } for pid=23685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f1234123f319bd070") ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 15:35:42 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 819.636793] audit: type=1400 audit(1556724941.709:17976): avc: denied { map } for pid=23686 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.745205] net_ratelimit: 24 callbacks suppressed [ 819.745210] protocol 88fb is buggy, dev hsr_slave_0 [ 819.755453] protocol 88fb is buggy, dev hsr_slave_1 15:35:42 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) chown(&(0x7f0000061280)='./file1\x00', 0x0, 0x0) [ 819.783336] audit: type=1400 audit(1556724941.709:17977): avc: denied { map } for pid=23685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.825183] protocol 88fb is buggy, dev hsr_slave_0 [ 819.830356] protocol 88fb is buggy, dev hsr_slave_1 [ 819.951460] audit: type=1400 audit(1556724941.709:17978): avc: denied { map } for pid=23685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.225020] protocol 88fb is buggy, dev hsr_slave_0 [ 820.230219] protocol 88fb is buggy, dev hsr_slave_1 15:35:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x29, 0x200000000000005, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:35:43 executing program 4: socketpair$unix(0x1, 0x5, 0xc501000000000000, &(0x7f0000000000)) 15:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', <r1=>0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x111, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) 15:35:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x209) r1 = dup2(r0, r0) write(r0, &(0x7f0000002a40)="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", 0x771) write(r1, &(0x7f00000014c0)="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", 0x78b) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14}}}]}]}, 0x54}}, 0x0) [ 820.464857] protocol 88fb is buggy, dev hsr_slave_0 [ 820.470051] protocol 88fb is buggy, dev hsr_slave_1 [ 820.704726] protocol 88fb is buggy, dev hsr_slave_0 [ 820.709956] protocol 88fb is buggy, dev hsr_slave_1 15:35:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.849277] ------------[ cut here ]------------ [ 820.854441] WARNING: CPU: 1 PID: 7117 at kernel/bpf/core.c:537 bpf_jit_free+0x23a/0x310 [ 820.862596] Kernel panic - not syncing: panic_on_warn set ... [ 820.862596] [ 820.869974] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 820.876648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.886026] Workqueue: events bpf_prog_free_deferred [ 820.891138] Call Trace: [ 820.893738] dump_stack+0x138/0x19c [ 820.897382] panic+0x1f2/0x438 [ 820.900580] ? add_taint.cold+0x16/0x16 [ 820.904568] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 820.911691] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 820.916626] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 820.923775] Oops: 0000 [#1] PREEMPT SMP KASAN [ 820.928452] Modules linked in: [ 820.931698] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 820.938365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:35:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.949751] Workqueue: events bpf_prog_free_deferred [ 820.954864] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 820.960938] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 820.966387] RSP: 0018:ffff888063db7810 EFLAGS: 00010806 [ 820.971782] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 820.979068] RDX: 0000000000000000 RSI: ffffffff869d1e40 RDI: ffffc900018fd002 [ 820.986435] RBP: ffff888063db7850 R08: 0000000000000000 R09: ffff8880a574a9f0 [ 820.993708] R10: ffff8880a574a9d0 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.000982] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.008524] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.016758] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.022652] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.029929] Call Trace: [ 821.032526] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.039632] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.044557] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.051602] Oops: 0000 [#2] PREEMPT SMP KASAN [ 821.056087] Modules linked in: [ 821.059281] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.065946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.075398] Workqueue: events bpf_prog_free_deferred [ 821.080502] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.086561] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.092001] RSP: 0018:ffff888063db7368 EFLAGS: 00010806 [ 821.097357] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.104651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.111936] RBP: ffff888063db73a8 R08: 0000000000000000 R09: 0000000000000001 [ 821.119205] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.126469] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.133738] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.141968] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.147949] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.155392] Call Trace: [ 821.158015] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.165141] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.170158] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.177009] Oops: 0000 [#3] PREEMPT SMP KASAN [ 821.181519] Modules linked in: [ 821.184712] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.191391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.200764] Workqueue: events bpf_prog_free_deferred [ 821.205902] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.211968] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.217417] RSP: 0018:ffff888063db6eb8 EFLAGS: 00010806 [ 821.222783] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.230053] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.237322] RBP: ffff888063db6ef8 R08: 0000000000000000 R09: 0000000000000001 [ 821.244592] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.251867] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.259140] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.267371] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.273345] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.280616] Call Trace: [ 821.283216] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.290333] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.295263] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.302128] Oops: 0000 [#4] PREEMPT SMP KASAN [ 821.306622] Modules linked in: [ 821.309852] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.317917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.327370] Workqueue: events bpf_prog_free_deferred [ 821.333429] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.339501] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.344947] RSP: 0018:ffff888063db6a08 EFLAGS: 00010806 [ 821.350329] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.357776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.365050] RBP: ffff888063db6a48 R08: 0000000000000000 R09: 0000000000000001 [ 821.372318] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.379589] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.386860] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.395116] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.401004] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.408276] Call Trace: [ 821.410875] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.418161] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.423080] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.430021] Oops: 0000 [#5] PREEMPT SMP KASAN [ 821.434507] Modules linked in: [ 821.437702] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.444356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.453720] Workqueue: events bpf_prog_free_deferred [ 821.458818] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.464879] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.470320] RSP: 0018:ffff888063db6558 EFLAGS: 00010806 [ 821.475677] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.482952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.490398] RBP: ffff888063db6598 R08: 0000000000000000 R09: 0000000000000001 [ 821.497665] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.504930] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.512210] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.520434] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.526312] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.533581] Call Trace: [ 821.536175] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.543285] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.548208] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.555147] Oops: 0000 [#6] PREEMPT SMP KASAN [ 821.559634] Modules linked in: [ 821.562819] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.569558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.578935] Workqueue: events bpf_prog_free_deferred [ 821.584037] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.590102] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.595551] RSP: 0018:ffff888063db60a8 EFLAGS: 00010806 [ 821.600921] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.608191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.615461] RBP: ffff888063db60e8 R08: 0000000000000000 R09: 0000000000000001 [ 821.622732] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.630004] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.637269] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.645497] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.651377] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.658644] Call Trace: [ 821.661240] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.668360] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.674679] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.681534] Oops: 0000 [#7] PREEMPT SMP KASAN [ 821.686025] Modules linked in: [ 821.689234] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.695890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.705255] Workqueue: events bpf_prog_free_deferred [ 821.710360] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.716421] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.721870] RSP: 0018:ffff888063db5bf8 EFLAGS: 00010806 [ 821.727237] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.734503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.741792] RBP: ffff888063db5c38 R08: 0000000000000000 R09: 0000000000000001 [ 821.749064] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.756335] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.763607] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.771832] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.777709] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.784981] Call Trace: [ 821.787576] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.794781] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.799705] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.806642] Oops: 0000 [#8] PREEMPT SMP KASAN [ 821.811127] Modules linked in: [ 821.814330] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.820985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.830350] Workqueue: events bpf_prog_free_deferred [ 821.837101] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.843165] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.848611] RSP: 0018:ffff888063db5748 EFLAGS: 00010806 [ 821.853999] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.861290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.868566] RBP: ffff888063db5788 R08: 0000000000000000 R09: 0000000000000001 [ 821.875852] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.889478] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.896771] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.904999] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.910904] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.918196] Call Trace: [ 821.920819] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.928194] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.933123] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.939991] Oops: 0000 [#9] PREEMPT SMP KASAN [ 821.944508] Modules linked in: [ 821.947699] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.954356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.963724] Workqueue: events bpf_prog_free_deferred [ 821.968827] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.974901] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.980344] RSP: 0018:ffff888063db5298 EFLAGS: 00010806 [ 821.985707] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.992977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.000423] RBP: ffff888063db52d8 R08: 0000000000000000 R09: 0000000000000001 [ 822.007702] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.014976] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.022270] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.030503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.036380] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.043665] Call Trace: [ 822.046281] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.053526] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.058627] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.066378] Oops: 0000 [#10] PREEMPT SMP KASAN [ 822.070951] Modules linked in: [ 822.074142] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.080799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.090428] Workqueue: events bpf_prog_free_deferred [ 822.095528] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.101594] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.107037] RSP: 0018:ffff888063db4de8 EFLAGS: 00010806 [ 822.112394] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.119664] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.126954] RBP: ffff888063db4e28 R08: 0000000000000000 R09: 0000000000000001 [ 822.134221] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.141493] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.148935] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.157181] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.163076] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.170342] Call Trace: [ 822.172939] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.180326] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.185249] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.192099] Oops: 0000 [#11] PREEMPT SMP KASAN [ 822.196671] Modules linked in: [ 822.199860] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.206515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.215879] Workqueue: events bpf_prog_free_deferred [ 822.220998] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.227156] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.232598] RSP: 0018:ffff888063db4938 EFLAGS: 00010806 [ 822.238004] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.245286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.252562] RBP: ffff888063db4978 R08: 0000000000000000 R09: 0000000000000001 [ 822.259921] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.267276] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.274548] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.282869] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.288763] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.296037] Call Trace: [ 822.298631] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.305737] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.310664] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.317599] Oops: 0000 [#12] PREEMPT SMP KASAN [ 822.322171] Modules linked in: [ 822.325373] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.332041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.341428] Workqueue: events bpf_prog_free_deferred [ 822.346538] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.352608] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.358059] RSP: 0018:ffff888063db4488 EFLAGS: 00010806 [ 822.363433] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.370727] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.378000] RBP: ffff888063db44c8 R08: 0000000000000000 R09: 0000000000000001 [ 822.385271] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.392547] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.399822] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.408049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.413933] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.421204] Call Trace: [ 822.423813] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.431366] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.436295] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.443169] Oops: 0000 [#13] PREEMPT SMP KASAN [ 822.447748] Modules linked in: [ 822.450949] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.457605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.467074] Workqueue: events bpf_prog_free_deferred [ 822.472199] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.478287] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.483737] RSP: 0018:ffff888063db3fd8 EFLAGS: 00010806 [ 822.489112] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.496399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.503692] RBP: ffff888063db4018 R08: 0000000000000000 R09: 0000000000000001 [ 822.510969] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.518239] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.525512] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.533931] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.539809] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.547077] Call Trace: [ 822.549679] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.556803] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.561722] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.568576] Oops: 0000 [#14] PREEMPT SMP KASAN [ 822.573148] Modules linked in: [ 822.576357] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.583033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.592420] Workqueue: events bpf_prog_free_deferred [ 822.597548] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.603606] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.609069] RSP: 0018:ffff888063db3b28 EFLAGS: 00010806 [ 822.614459] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.621736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.629179] RBP: ffff888063db3b68 R08: 0000000000000000 R09: 0000000000000001 [ 822.636537] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.643805] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.651266] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.659494] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.665400] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.672771] Call Trace: [ 822.675372] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.682488] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.687430] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.694285] Oops: 0000 [#15] PREEMPT SMP KASAN [ 822.698860] Modules linked in: [ 822.702150] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.708806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.718172] Workqueue: events bpf_prog_free_deferred [ 822.723306] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.729391] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.734833] RSP: 0018:ffff888063db3678 EFLAGS: 00010806 [ 822.740188] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.747453] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.754721] RBP: ffff888063db36b8 R08: 0000000000000000 R09: 0000000000000001 [ 822.761984] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.769252] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.776518] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.784733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.790609] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.797875] Call Trace: [ 822.800472] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.807596] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.812515] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.819366] Oops: 0000 [#16] PREEMPT SMP KASAN [ 822.823936] Modules linked in: [ 822.827125] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.833804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.843169] Workqueue: events bpf_prog_free_deferred [ 822.848275] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.854339] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.859789] RSP: 0018:ffff888063db31c8 EFLAGS: 00010806 [ 822.865156] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.872425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.879691] RBP: ffff888063db3208 R08: 0000000000000000 R09: 0000000000000001 [ 822.886960] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.894227] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.901494] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.909719] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.915601] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.922877] Call Trace: [ 822.925490] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.932603] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.937615] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.947019] Oops: 0000 [#17] PREEMPT SMP KASAN [ 822.951603] Modules linked in: [ 822.954796] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.961455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.970824] Workqueue: events bpf_prog_free_deferred [ 822.976016] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.982099] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.987545] RSP: 0018:ffff888063db2d18 EFLAGS: 00010806 [ 822.992992] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.000260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.007552] RBP: ffff888063db2d58 R08: 0000000000000000 R09: 0000000000000001 [ 823.014842] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.022117] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.029396] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.037652] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.043533] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.050806] Call Trace: [ 823.053409] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.060537] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.065478] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.072329] Oops: 0000 [#18] PREEMPT SMP KASAN [ 823.076925] Modules linked in: [ 823.080119] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.086790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.096257] Workqueue: events bpf_prog_free_deferred [ 823.101360] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.107432] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.112876] RSP: 0018:ffff888063db2868 EFLAGS: 00010806 [ 823.118266] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.125553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.132824] RBP: ffff888063db28a8 R08: 0000000000000000 R09: 0000000000000001 [ 823.140096] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.147390] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.154663] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.162893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.168860] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.176136] Call Trace: [ 823.178741] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.185856] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.190796] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.197651] Oops: 0000 [#19] PREEMPT SMP KASAN [ 823.202222] Modules linked in: [ 823.205496] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.212416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.221791] Workqueue: events bpf_prog_free_deferred [ 823.226991] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.233320] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.238905] RSP: 0018:ffff888063db23b8 EFLAGS: 00010806 [ 823.244268] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.251717] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.259097] RBP: ffff888063db23f8 R08: 0000000000000000 R09: 0000000000000001 [ 823.266521] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.274125] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.281640] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.290014] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.295902] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.303178] Call Trace: [ 823.305780] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.312892] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.317812] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.324664] Oops: 0000 [#20] PREEMPT SMP KASAN [ 823.329487] Modules linked in: [ 823.332796] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.339625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.349103] Workqueue: events bpf_prog_free_deferred [ 823.354206] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.360497] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.366199] RSP: 0018:ffff888063db1f08 EFLAGS: 00010806 [ 823.371561] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.378855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.386128] RBP: ffff888063db1f48 R08: 0000000000000000 R09: 0000000000000001 [ 823.393416] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.400708] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.407993] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.416219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.422095] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.429394] Call Trace: [ 823.431995] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.439198] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.444150] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.451026] Oops: 0000 [#21] PREEMPT SMP KASAN [ 823.455604] Modules linked in: [ 823.458794] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.465451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.475145] Workqueue: events bpf_prog_free_deferred [ 823.480350] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.486414] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.491880] RSP: 0018:ffff888063db1a58 EFLAGS: 00010806 [ 823.497247] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.504536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.511803] RBP: ffff888063db1a98 R08: 0000000000000000 R09: 0000000000000001 [ 823.519093] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.526378] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.533647] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.541873] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.547745] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.555021] Call Trace: [ 823.557639] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.564752] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.569679] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.576536] Oops: 0000 [#22] PREEMPT SMP KASAN [ 823.581110] Modules linked in: [ 823.584300] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.590973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.600341] Workqueue: events bpf_prog_free_deferred [ 823.605445] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.611526] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.616972] RSP: 0018:ffff888063db15a8 EFLAGS: 00010806 [ 823.622359] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.629649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.636919] RBP: ffff888063db15e8 R08: 0000000000000000 R09: 0000000000000001 [ 823.644190] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.651460] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.658740] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.666973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.672938] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.680212] Call Trace: [ 823.682822] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.689938] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.694862] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.701719] Oops: 0000 [#23] PREEMPT SMP KASAN [ 823.706307] Modules linked in: [ 823.709597] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.716339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.725722] Workqueue: events bpf_prog_free_deferred [ 823.730914] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.736974] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.742417] RSP: 0018:ffff888063db10f8 EFLAGS: 00010806 [ 823.747782] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.755049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.762316] RBP: ffff888063db1138 R08: 0000000000000000 R09: 0000000000000001 [ 823.769592] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.776861] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.784130] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.792378] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.798272] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.805549] Call Trace: [ 823.808145] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.815258] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.820178] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.827065] Oops: 0000 [#24] PREEMPT SMP KASAN [ 823.831640] Modules linked in: [ 823.835919] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.842686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.852056] Workqueue: events bpf_prog_free_deferred [ 823.857161] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.863232] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.868676] RSP: 0018:ffff888063db0c48 EFLAGS: 00010806 [ 823.874033] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.881308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.888575] RBP: ffff888063db0c88 R08: 0000000000000000 R09: 0000000000000001 [ 823.895844] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.903112] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.910383] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.918611] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.924492] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.931764] Call Trace: [ 823.934373] BUG: unable to handle kernel paging request at fffffbfff4002000