) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000d80)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000ec0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@local, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001140)=0xe8) clock_gettime(0x0, &(0x7f0000002000)) recvmmsg(0xffffffffffffff9c, &(0x7f0000001e80), 0x0, 0x0, &(0x7f0000002040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005e40), &(0x7f0000005e80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005f00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000006000)=0xe8) accept(0xffffffffffffff9c, &(0x7f0000006040)=@hci, &(0x7f00000060c0)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006180)={'teql0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000061c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006200)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000066c0)={0x0, @multicast2, @remote}, &(0x7f0000006700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006740)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000006840)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000006880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f0000006980)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000071c0)={&(0x7f0000000240), 0xc, &(0x7f0000007180)={&(0x7f00000069c0)=ANY=[]}}, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:29 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 2448.939433] audit: type=1400 audit(2000000489.300:2972): avc: denied { create } for pid=26869 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2448.982040] audit: type=1400 audit(2000000489.340:2973): avc: denied { map } for pid=26871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2449.019936] audit: type=1400 audit(2000000489.390:2974): avc: denied { map } for pid=26872 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2449.070995] audit: type=1400 audit(2000000489.440:2975): avc: denied { map } for pid=26873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:29 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) [ 2449.183810] audit: type=1400 audit(2000000489.550:2976): avc: denied { map } for pid=26878 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:29 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) [ 2449.304309] audit: type=1400 audit(2000000489.670:2977): avc: denied { map } for pid=26883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:29 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getgid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 2449.622102] audit: type=1400 audit(2000000489.990:2978): avc: denied { map } for pid=26887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1}, [{}]}, 0x58) 03:41:30 executing program 4: perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) [ 2449.753557] audit: type=1400 audit(2000000490.120:2979): avc: denied { create } for pid=26881 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:41:30 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:41:30 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 03:41:30 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/63, &(0x7f0000000500)=0x3f) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) epoll_create1(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) getegid() seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f00000005c0)}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$void(0x0) 03:41:30 executing program 4: perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) 03:41:30 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6c, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 03:41:30 executing program 4: perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) 03:41:30 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:41:30 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) 03:41:30 executing program 4: perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) 03:41:30 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)}) ioctl$void(0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) ustat(0x0, &(0x7f0000000140)) gettid() getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180), 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigreturn() syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:41:30 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:41:30 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:41:30 executing program 1: getegid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$packet(0x11, 0x0, 0x300) setgroups(0x0, &(0x7f00000002c0)) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) restart_syscall() syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:41:31 executing program 1: getegid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$packet(0x11, 0x0, 0x300) setgroups(0x0, &(0x7f00000002c0)) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) restart_syscall() syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:41:31 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/63, &(0x7f0000000500)=0x3f) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) epoll_create1(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) getegid() seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f00000005c0)}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$void(0x0) 03:41:31 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:41:32 executing program 1: getegid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$packet(0x11, 0x0, 0x300) setgroups(0x0, &(0x7f00000002c0)) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) restart_syscall() syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:41:32 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:41:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 03:41:32 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) 03:41:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) sigaltstack(&(0x7f0000c77000/0x4000)=nil, &(0x7f00000000c0)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000200), 0xb) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)=""/4096, &(0x7f00000001c0)=0x1000) ioctl$void(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000380)="428055a07d6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a42dbe0c19086d9f28fc9410feefae5e54175a55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 03:41:33 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:41:33 executing program 1: getegid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$packet(0x11, 0x0, 0x300) setgroups(0x0, &(0x7f00000002c0)) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) restart_syscall() syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:41:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:41:34 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 2454.018685] kauditd_printk_skb: 25 callbacks suppressed [ 2454.018699] audit: type=1400 audit(2000000494.380:3005): avc: denied { map } for pid=26979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2454.062429] audit: type=1400 audit(2000000494.380:3006): avc: denied { map } for pid=26981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2454.123079] audit: type=1400 audit(2000000494.490:3009): avc: denied { map } for pid=26987 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2454.150401] audit: type=1400 audit(2000000494.480:3008): avc: denied { create } for pid=26967 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 [ 2454.177106] audit: type=1400 audit(2000000494.550:3010): avc: denied { create } for pid=26980 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2454.203107] audit: type=1400 audit(2000000494.470:3007): avc: denied { create } for pid=26967 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2454.228241] audit: type=1326 audit(2000000494.580:3011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26980 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:41:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:41:34 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 2454.356443] audit: type=1400 audit(2000000494.720:3012): avc: denied { create } for pid=26970 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:41:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 2454.461908] audit: type=1400 audit(2000000494.830:3013): avc: denied { map } for pid=26998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2454.491577] audit: type=1400 audit(2000000494.830:3014): avc: denied { map } for pid=26997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:34 executing program 0: r0 = socket(0x840000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a) 03:41:35 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb) 03:41:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 03:41:35 executing program 0: r0 = socket(0x840000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a) 03:41:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 03:41:35 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:41:35 executing program 0: r0 = socket(0x840000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a) 03:41:35 executing program 0: r0 = socket(0x840000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a) 03:41:35 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:35 executing program 0: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) prctl$seccomp(0x16, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @reserved}, 0x10) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c401781322410feefae5e54175455d0f2e1a1a01dff231a3b786e2989f7f") shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000780)=""/100) syz_read_part_table(0x0, 0x0, &(0x7f0000000380)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='-vboxnet1wlan1\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000180), &(0x7f0000000440)=0x4) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000800)) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f00000006c0)) 03:41:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:41:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:41:35 executing program 1: r0 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) [ 2455.548091] netlink: 'syz-executor1': attribute type 15 has an invalid length. 03:41:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4) r1 = socket$packet(0x11, 0x4000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0) 03:41:36 executing program 1: r0 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 03:41:36 executing program 3: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0)) semget(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:41:36 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:41:36 executing program 1: r0 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) [ 2455.738332] netlink: 'syz-executor1': attribute type 15 has an invalid length. 03:41:36 executing program 1: r0 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) [ 2455.840760] netlink: 'syz-executor1': attribute type 15 has an invalid length. 03:41:36 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) [ 2455.930584] netlink: 'syz-executor1': attribute type 15 has an invalid length. 03:41:36 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4) r1 = socket$packet(0x11, 0x4000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0) 03:41:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() exit(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) getgid() dup(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:41:36 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:41:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4) r1 = socket$packet(0x11, 0x4000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0) 03:41:36 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:41:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:41:37 executing program 3: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0)) semget(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:41:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4) r1 = socket$packet(0x11, 0x4000000002, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0) 03:41:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:41:37 executing program 0: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc) 03:41:37 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000001400)='/dev/full\x00', 0x101540, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:37 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) gettid() setpriority(0x0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 03:41:38 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/14, 0xe) 03:41:38 executing program 5: ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000000)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000400)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000300), 0x0) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3f, 0x101000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() fcntl$lock(r0, 0x5, &(0x7f00000002c0)={0x3, 0x3, 0x8, 0x5, r3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0x24}) 03:41:38 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/14, 0xe) 03:41:38 executing program 3: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0)) semget(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:41:38 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/14, 0xe) 03:41:38 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/14, 0xe) 03:41:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) gettid() setpriority(0x0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 03:41:38 executing program 1: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:39 executing program 0: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc) 03:41:39 executing program 1: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:39 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:41:39 executing program 1: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) gettid() setpriority(0x0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) [ 2459.327822] kauditd_printk_skb: 70 callbacks suppressed [ 2459.327837] audit: type=1400 audit(2000000499.690:3085): avc: denied { map } for pid=27186 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2459.568608] audit: type=1400 audit(2000000499.740:3086): avc: denied { map } for pid=27187 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2459.592629] audit: type=1400 audit(2000000499.750:3087): avc: denied { create } for pid=27183 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2459.617654] audit: type=1400 audit(2000000499.750:3088): avc: denied { create } for pid=27183 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2459.673158] audit: type=1400 audit(2000000499.760:3089): avc: denied { map } for pid=27190 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2459.721642] audit: type=1400 audit(2000000500.080:3090): avc: denied { map } for pid=27191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2459.770319] audit: type=1400 audit(2000000500.100:3091): avc: denied { map } for pid=27192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:40 executing program 5: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:40 executing program 1: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) [ 2460.135836] audit: type=1400 audit(2000000500.500:3092): avc: denied { map } for pid=27195 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2460.159886] audit: type=1400 audit(2000000500.510:3093): avc: denied { map } for pid=27196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:40 executing program 3: rmdir(&(0x7f0000000200)='./file0\x00') getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0)) semget(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:41:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) gettid() setpriority(0x0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) [ 2460.183630] audit: type=1400 audit(2000000500.530:3094): avc: denied { map } for pid=27198 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 03:41:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 03:41:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 03:41:41 executing program 0: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc) 03:41:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 03:41:41 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf") 03:41:41 executing program 2: socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840)) stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0)) getgroups(0x0, &(0x7f0000002940)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getgroups(0x0, &(0x7f0000002c40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) gettid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:41:41 executing program 5: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00)) timerfd_create(0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000f40)) lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getgroups(0x0, &(0x7f0000001100)) perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e) perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10) openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) socket$inet6(0xa, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40)) syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0) open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8) stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40)) syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48) accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340)) perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000007440)) perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0) epoll_create1(0x0) syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00)) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'}) link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10) clock_gettime(0x0, &(0x7f00000004c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000580)) delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0) setgroups(0x4320, &(0x7f0000000800)) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}}) 03:41:41 executing program 3: prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000006380), &(0x7f00000063c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006800)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007d80), &(0x7f0000007dc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:41:42 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf") 03:41:42 executing program 5: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}}) 03:41:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00)) timerfd_create(0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000f40)) lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getgroups(0x0, &(0x7f0000001100)) perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e) perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10) openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) socket$inet6(0xa, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40)) syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0) open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8) stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40)) syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48) accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340)) perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000007440)) perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0) epoll_create1(0x0) syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00)) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'}) link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10) clock_gettime(0x0, &(0x7f00000004c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000580)) delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0) setgroups(0x4320, &(0x7f0000000800)) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}}) 03:41:42 executing program 0: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc) 03:41:43 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf") 03:41:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00)) timerfd_create(0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000f40)) lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getgroups(0x0, &(0x7f0000001100)) perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e) perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10) openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) socket$inet6(0xa, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40)) syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0) open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8) stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40)) syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48) accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340)) perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000007440)) perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0) epoll_create1(0x0) syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00)) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'}) link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10) clock_gettime(0x0, &(0x7f00000004c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000580)) delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0) setgroups(0x4320, &(0x7f0000000800)) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}}) 03:41:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}}) 03:41:43 executing program 2: socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840)) stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0)) getgroups(0x0, &(0x7f0000002940)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getgroups(0x0, &(0x7f0000002c40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) gettid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:41:44 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf") 03:41:44 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x5, 0x4, 0x1}, 0x2c) 03:41:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 03:41:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00)) timerfd_create(0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000f40)) lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getgroups(0x0, &(0x7f0000001100)) perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e) perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10) openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) socket$inet6(0xa, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40)) syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0) open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8) stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40)) syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48) accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340)) perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000007440)) perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0) epoll_create1(0x0) syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0)) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00)) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'}) link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10) clock_gettime(0x0, &(0x7f00000004c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000580)) delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0) setgroups(0x4320, &(0x7f0000000800)) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}}) [ 2464.359297] kauditd_printk_skb: 46 callbacks suppressed [ 2464.359310] audit: type=1400 audit(2000000504.730:3141): avc: denied { map } for pid=27303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}}) [ 2464.498069] audit: type=1400 audit(2000000504.860:3142): avc: denied { map_create } for pid=27304 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 2464.571218] audit: type=1400 audit(2000000504.890:3143): avc: denied { map } for pid=27308 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2464.594559] audit: type=1400 audit(2000000504.890:3144): avc: denied { map } for pid=27309 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2464.618281] audit: type=1400 audit(2000000504.900:3145): avc: denied { prog_load } for pid=27304 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 2464.673559] audit: type=1400 audit(2000000505.040:3146): avc: denied { map } for pid=27311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:45 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:41:45 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ustat(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 2465.448452] audit: type=1400 audit(2000000505.810:3147): avc: denied { map } for pid=27315 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2465.500923] audit: type=1400 audit(2000000505.870:3148): avc: denied { create } for pid=27316 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:41:45 executing program 2: socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840)) stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0)) getgroups(0x0, &(0x7f0000002940)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getgroups(0x0, &(0x7f0000002c40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) gettid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:41:46 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ustat(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}}) [ 2465.655704] audit: type=1400 audit(2000000506.020:3149): avc: denied { map_create } for pid=27318 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:41:46 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) [ 2465.702491] audit: type=1400 audit(2000000506.020:3150): avc: denied { map_create } for pid=27318 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:41:46 executing program 5: prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:41:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 03:41:46 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ustat(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:46 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ustat(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:46 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}}) 03:41:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 03:41:46 executing program 3: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) 03:41:46 executing program 2: socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) gettid() ptrace(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840)) stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0)) getgroups(0x0, &(0x7f0000002940)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getgroups(0x0, &(0x7f0000002c40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) gettid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:41:47 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:41:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0) 03:41:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:47 executing program 5: prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:41:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:47 executing program 3: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) 03:41:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14) 03:41:47 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:41:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:48 executing program 5: prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:41:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:48 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:48 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180)) read(r0, &(0x7f0000000400)=""/100, 0x64) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) 03:41:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14) 03:41:48 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180)) read(r0, &(0x7f0000000400)=""/100, 0x64) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) 03:41:49 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180)) read(r0, &(0x7f0000000400)=""/100, 0x64) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) 03:41:49 executing program 3: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) 03:41:49 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180)) read(r0, &(0x7f0000000400)=""/100, 0x64) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) 03:41:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0184908, &(0x7f0000001000)) 03:41:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0184908, &(0x7f0000001000)) 03:41:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:41:49 executing program 5: prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:41:49 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0184908, &(0x7f0000001000)) [ 2469.810597] kauditd_printk_skb: 47 callbacks suppressed [ 2469.810612] audit: type=1400 audit(2000000510.170:3198): avc: denied { map } for pid=27475 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:50 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c") ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc) read$FUSE(r0, &(0x7f0000000700), 0x1000) 03:41:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14) 03:41:50 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0184908, &(0x7f0000001000)) 03:41:50 executing program 3: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) [ 2469.846057] audit: type=1400 audit(2000000510.170:3199): avc: denied { map } for pid=27466 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3192/bus" dev="sda1" ino=17133 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 03:41:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:41:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 2469.922150] audit: type=1400 audit(2000000510.290:3200): avc: denied { map } for pid=27481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2469.966380] audit: type=1400 audit(2000000510.330:3201): avc: denied { map } for pid=27482 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2470.032905] audit: type=1400 audit(2000000510.400:3202): avc: denied { map } for pid=27488 comm="syz-executor1" path="/root/syzkaller-testdir032991155/syzkaller.p57T6G/3376/bus" dev="sda1" ino=17142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 [ 2470.141132] audit: type=1400 audit(2000000510.430:3203): avc: denied { map } for pid=27490 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3193/bus" dev="sda1" ino=17143 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 03:41:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:41:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 2470.992203] audit: type=1400 audit(2000000511.360:3204): avc: denied { map } for pid=27495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2471.124389] audit: type=1400 audit(2000000511.380:3205): avc: denied { map } for pid=27498 comm="syz-executor1" path="/root/syzkaller-testdir032991155/syzkaller.p57T6G/3377/bus" dev="sda1" ino=17142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 [ 2471.198488] audit: type=1400 audit(2000000511.390:3206): avc: denied { map } for pid=27496 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3194/bus" dev="sda1" ino=17143 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 03:41:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:41:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 2471.977890] audit: type=1400 audit(2000000512.340:3207): avc: denied { map } for pid=27502 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3195/bus" dev="sda1" ino=17146 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 03:41:53 executing program 5: futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0xffffffffffffffaa) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff9) set_robust_list(&(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, 0x18) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000080)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) gettid() getpid() getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) getpgrp(0x0) getpgrp(0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:53 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") prctl$intptr(0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpgid(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e40)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00)) getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) 03:41:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) getgid() syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80) utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14) 03:41:53 executing program 4: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:53 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:41:53 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)}) 03:41:54 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:41:54 executing program 4: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:55 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:41:55 executing program 4: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:55 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)}) 03:41:55 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 2474.826586] kauditd_printk_skb: 12 callbacks suppressed [ 2474.826601] audit: type=1400 audit(2000000515.190:3220): avc: denied { create } for pid=27542 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2474.963152] audit: type=1400 audit(2000000515.330:3221): avc: denied { map } for pid=27545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:56 executing program 4: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680}) syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 2475.703275] audit: type=1400 audit(2000000516.070:3222): avc: denied { map } for pid=27548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:56 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") prctl$intptr(0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpgid(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e40)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00)) getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) 03:41:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 03:41:56 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 2475.736561] audit: type=1400 audit(2000000516.090:3223): avc: denied { map } for pid=27551 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2475.767769] audit: type=1400 audit(2000000516.090:3224): avc: denied { map } for pid=27549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:56 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8) [ 2475.793318] audit: type=1400 audit(2000000516.160:3225): avc: denied { create } for pid=27550 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2475.825463] audit: type=1400 audit(2000000516.190:3226): avc: denied { map } for pid=27554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:56 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8) 03:41:56 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8) 03:41:56 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8) 03:41:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040)) 03:41:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=""/222, 0x74) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) poll(&(0x7f0000000380)=[{r0}], 0x1, 0xff) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) 03:41:56 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)}) [ 2476.180026] audit: type=1400 audit(2000000516.550:3227): avc: denied { map } for pid=27580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2476.252161] audit: type=1400 audit(2000000516.620:3228): avc: denied { map } for pid=27582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2476.474663] audit: type=1400 audit(2000000516.840:3229): avc: denied { map } for pid=27585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:41:57 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:41:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 03:41:57 executing program 4: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:57 executing program 0: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)}) 03:41:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68) 03:41:57 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") prctl$intptr(0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpgid(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e40)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00)) getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) 03:41:58 executing program 4: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68) 03:41:58 executing program 4: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68) 03:41:59 executing program 4: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:41:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 03:41:59 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:41:59 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:41:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68) 03:42:00 executing program 4: clock_gettime(0x5, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:42:00 executing program 1: syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 2480.373596] kauditd_printk_skb: 14 callbacks suppressed [ 2480.373609] audit: type=1400 audit(2000000520.740:3244): avc: denied { map } for pid=27637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2480.441331] audit: type=1400 audit(2000000520.780:3245): avc: denied { create } for pid=27638 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:01 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") prctl$intptr(0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpgid(0x0) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e40)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00)) getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) 03:42:01 executing program 4: clock_gettime(0x5, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 2481.130697] audit: type=1400 audit(2000000521.500:3246): avc: denied { map } for pid=27647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2481.214640] audit: type=1400 audit(2000000521.580:3247): avc: denied { create } for pid=27638 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:01 executing program 1: syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) [ 2481.307940] audit: type=1400 audit(2000000521.670:3248): avc: denied { map } for pid=27657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2481.341203] audit: type=1400 audit(2000000521.710:3249): avc: denied { create } for pid=27658 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2481.761543] audit: type=1400 audit(2000000522.130:3250): avc: denied { map } for pid=27661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:02 executing program 4: clock_gettime(0x5, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:42:02 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:02 executing program 1: syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 2482.131819] audit: type=1400 audit(2000000522.500:3251): avc: denied { map } for pid=27666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2482.202499] audit: type=1400 audit(2000000522.570:3252): avc: denied { map } for pid=27667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2482.244756] audit: type=1400 audit(2000000522.610:3253): avc: denied { create } for pid=27668 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:03 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:42:03 executing program 4: clock_gettime(0x5, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:42:03 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0/file0/../file0\x00', &(0x7f0000001740)='bpf\x00', 0x0, &(0x7f0000001780)) mount$bpf(0x0, &(0x7f0000001700)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f00000016c0)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x40000, &(0x7f00000000c0)) 03:42:03 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) unshare(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) getpgid(0xffffffffffffffff) getpgrp(0x0) gettid() syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) 03:42:03 executing program 1: syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:04 executing program 4: clock_getres(0x9, &(0x7f0000000200)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") setns(0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc) 03:42:04 executing program 1: getrusage(0x0, &(0x7f00000006c0)) epoll_create(0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}}) io_setup(0x0, &(0x7f0000000340)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 03:42:04 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:05 executing program 4: clock_getres(0x9, &(0x7f0000000200)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") setns(0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc) 03:42:05 executing program 2: clock_gettime(0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) prctl$seccomp(0x16, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='-vboxnet1wlan1\x00', 0xf, 0x0) clock_gettime(0x0, &(0x7f0000000280)) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0), 0x8) syz_open_dev$mice(&(0x7f00000005c0)='/dev/input/mice\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) geteuid() getegid() fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)=""/104, &(0x7f0000000480)=0x68) ppoll(&(0x7f0000000500), 0x0, &(0x7f0000000540)={0x77359400}, &(0x7f0000000580), 0x8) 03:42:05 executing program 1: getrusage(0x0, &(0x7f00000006c0)) epoll_create(0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}}) io_setup(0x0, &(0x7f0000000340)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 03:42:05 executing program 4: clock_getres(0x9, &(0x7f0000000200)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") setns(0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc) [ 2485.534960] kauditd_printk_skb: 12 callbacks suppressed [ 2485.534974] audit: type=1400 audit(2000000525.900:3266): avc: denied { map } for pid=27711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2485.659204] audit: type=1400 audit(2000000526.030:3267): avc: denied { create } for pid=27712 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:06 executing program 1: getrusage(0x0, &(0x7f00000006c0)) epoll_create(0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}}) io_setup(0x0, &(0x7f0000000340)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 03:42:06 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:06 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]}) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174) [ 2485.736148] audit: type=1400 audit(2000000526.100:3268): avc: denied { map } for pid=27715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2485.805820] audit: type=1400 audit(2000000526.170:3269): avc: denied { map } for pid=27720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2485.836873] audit: type=1400 audit(2000000526.180:3270): avc: denied { map } for pid=27719 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:06 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) unshare(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) getpgid(0xffffffffffffffff) getpgrp(0x0) gettid() syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) 03:42:06 executing program 4: clock_getres(0x9, &(0x7f0000000200)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") setns(0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc) [ 2486.515600] audit: type=1400 audit(2000000526.880:3271): avc: denied { map } for pid=27727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2486.599484] audit: type=1400 audit(2000000526.970:3272): avc: denied { create } for pid=27723 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:07 executing program 1: getrusage(0x0, &(0x7f00000006c0)) epoll_create(0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}}) io_setup(0x0, &(0x7f0000000340)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) [ 2486.692101] audit: type=1400 audit(2000000527.060:3273): avc: denied { map } for pid=27729 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:07 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe(&(0x7f0000000040)) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) 03:42:08 executing program 1: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) [ 2487.675700] audit: type=1400 audit(2000000528.040:3274): avc: denied { map } for pid=27739 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:08 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe(&(0x7f0000000040)) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) [ 2488.936909] audit: type=1400 audit(2000000529.300:3275): avc: denied { map } for pid=27752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:09 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:09 executing program 1: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) 03:42:09 executing program 0: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24) 03:42:09 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe(&(0x7f0000000040)) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) 03:42:10 executing program 1: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) 03:42:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]}) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174) 03:42:10 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) unshare(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) getpgid(0xffffffffffffffff) getpgrp(0x0) gettid() syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) 03:42:10 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) pipe(&(0x7f0000000040)) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) clock_gettime(0x0, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) 03:42:11 executing program 1: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) [ 2490.700878] kauditd_printk_skb: 4 callbacks suppressed [ 2490.700892] audit: type=1400 audit(2000000531.070:3280): avc: denied { map } for pid=27778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2490.912301] audit: type=1400 audit(2000000531.280:3281): avc: denied { map } for pid=27785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2491.072149] audit: type=1400 audit(2000000531.440:3282): avc: denied { map } for pid=27796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:11 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:11 executing program 0: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24) 03:42:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getegid() geteuid() getgid() getuid() fstat(0xffffffffffffffff, &(0x7f00000021c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002240)) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) [ 2491.560374] audit: type=1400 audit(2000000531.930:3283): avc: denied { map } for pid=27798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:12 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000004000000000000001d0000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERRORu(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="13000000070100060067584c"], 0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) [ 2491.677263] audit: type=1400 audit(2000000532.040:3284): avc: denied { map } for pid=27803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2491.726631] 9pnet: Insufficient options for proto=fd [ 2491.740626] 9pnet: Insufficient options for proto=fd 03:42:12 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]}) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174) [ 2492.136618] audit: type=1400 audit(2000000532.500:3285): avc: denied { map } for pid=27813 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2492.220105] audit: type=1400 audit(2000000532.590:3286): avc: denied { map } for pid=27815 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:12 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) unshare(0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) getpgid(0xffffffffffffffff) getpgrp(0x0) gettid() syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) 03:42:12 executing program 4: io_setup(0x4000000005, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f00000002c0)={0x20}, 0x20) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000440), 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480), &(0x7f00000004c0)=0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000780)) clone(0x0, &(0x7f0000000500), &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000340), 0x8) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) 03:42:12 executing program 0: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24) [ 2492.381874] audit: type=1400 audit(2000000532.750:3287): avc: denied { map } for pid=27819 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getegid() geteuid() getgid() getuid() fstat(0xffffffffffffffff, &(0x7f00000021c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002240)) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) [ 2492.535843] audit: type=1400 audit(2000000532.900:3288): avc: denied { map } for pid=27825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:13 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]}) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174) 03:42:13 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:13 executing program 4: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) msgget(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40)) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 2493.319627] audit: type=1400 audit(2000000533.690:3289): avc: denied { map } for pid=27839 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:13 executing program 0: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24) 03:42:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getegid() geteuid() getgid() getuid() fstat(0xffffffffffffffff, &(0x7f00000021c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002240)) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) 03:42:14 executing program 4: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) msgget(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40)) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 03:42:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce) fstat(0xffffffffffffffff, &(0x7f0000000940)) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getegid() geteuid() getgid() getuid() fstat(0xffffffffffffffff, &(0x7f00000021c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002240)) lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) 03:42:15 executing program 4: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) msgget(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40)) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 03:42:15 executing program 1: futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0) clock_getres(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941") syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') 03:42:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r1, 0x4000008907, &(0x7f00000001c0)) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) 03:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0) 03:42:15 executing program 3: prctl$intptr(0x1f, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:16 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:16 executing program 4: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) msgget(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)) getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40)) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 2496.049920] kauditd_printk_skb: 12 callbacks suppressed [ 2496.049934] audit: type=1400 audit(2000000536.420:3302): avc: denied { map } for pid=27886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2496.091356] audit: type=1400 audit(2000000536.460:3303): avc: denied { prog_load } for pid=27889 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:42:16 executing program 1: futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0) clock_getres(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941") syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') [ 2496.220660] audit: type=1400 audit(2000000536.590:3304): avc: denied { map } for pid=27896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'teql0\x00', 0x102}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)) 03:42:17 executing program 4: signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8) dup(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600)) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 2496.994713] audit: type=1400 audit(2000000537.360:3305): avc: denied { create } for pid=27919 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 03:42:17 executing program 1: futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0) clock_getres(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941") syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') [ 2497.162182] audit: type=1400 audit(2000000537.390:3306): avc: denied { map } for pid=27922 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2497.190204] audit: type=1400 audit(2000000537.390:3307): avc: denied { map } for pid=27923 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2497.213829] audit: type=1400 audit(2000000537.530:3308): avc: denied { map } for pid=27924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:17 executing program 1: futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0) clock_getres(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941") syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') 03:42:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0) [ 2497.315285] audit: type=1400 audit(2000000537.680:3309): avc: denied { map } for pid=27931 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2497.841293] audit: type=1400 audit(2000000538.210:3310): avc: denied { create } for pid=27919 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 [ 2497.867627] audit: type=1400 audit(2000000538.240:3311): avc: denied { map } for pid=27938 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:18 executing program 4: signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8) dup(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600)) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:42:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r1, 0x4000008907, &(0x7f00000001c0)) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) 03:42:18 executing program 1: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8) getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) 03:42:18 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:18 executing program 2: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:42:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0) 03:42:19 executing program 4: signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8) dup(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600)) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:42:19 executing program 1: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8) getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) 03:42:20 executing program 4: signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8) dup(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600)) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:42:20 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0) 03:42:20 executing program 1: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8) getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) 03:42:20 executing program 2: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:42:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r1, 0x4000008907, &(0x7f00000001c0)) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) 03:42:21 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080), &(0x7f0000000140)=0x8) 03:42:21 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a}) 03:42:21 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:21 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd) rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080)) 03:42:21 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd) rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080)) 03:42:21 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a}) 03:42:21 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd) rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080)) 03:42:21 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd) rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080)) 03:42:21 executing program 4: prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:21 executing program 1: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8) getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) [ 2501.171956] kauditd_printk_skb: 30 callbacks suppressed [ 2501.171970] audit: type=1400 audit(2000000541.540:3342): avc: denied { map } for pid=28037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2501.237977] audit: type=1400 audit(2000000541.580:3343): avc: denied { map } for pid=28040 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:22 executing program 2: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") [ 2502.002591] audit: type=1400 audit(2000000542.370:3344): avc: denied { map } for pid=28047 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2502.064624] audit: type=1400 audit(2000000542.430:3345): avc: denied { map } for pid=28048 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2502.111887] audit: type=1400 audit(2000000542.480:3346): avc: denied { map } for pid=28049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2502.142892] audit: type=1400 audit(2000000542.510:3347): avc: denied { create } for pid=28050 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(r1, 0x4000008907, &(0x7f00000001c0)) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) 03:42:22 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a}) 03:42:22 executing program 4: prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 03:42:22 executing program 3: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:22 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a}) [ 2502.234682] audit: type=1400 audit(2000000542.600:3348): avc: denied { map } for pid=28052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 2502.327375] audit: type=1400 audit(2000000542.690:3349): avc: denied { map } for pid=28061 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 2502.370667] audit: type=1400 audit(2000000542.700:3350): avc: denied { map } for pid=28062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2502.415611] audit: type=1400 audit(2000000542.780:3351): avc: denied { map } for pid=28065 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 03:42:22 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:42:23 executing program 1: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:42:23 executing program 1: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:42:23 executing program 4: prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:23 executing program 2: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:42:23 executing program 1: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:42:23 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:42:23 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[]) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f00000006c0)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x4000000) 03:42:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c48875e05b18a4cb3a9cd12dcea440d899c22cebd3b6abf62d996addb07aa3cde470652b3a471b4a7fa2f3fdf6e034d8000000004b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[], 0xffffff19) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x6611, &(0x7f0000000040)) 03:42:23 executing program 1: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:42:24 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:24 executing program 4: prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:25 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f000061e000)={0xd, 0x2, 0x4, 0x69, 0x0, r0}, 0x2c) 03:42:25 executing program 4: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) fchdir(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:25 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:42:26 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:26 executing program 3: clock_gettime(0x4, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000380)=0x54) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xfffffffffffffe4c) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@remote}, 0x14) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() syz_open_procfs(0x0, &(0x7f0000000140)='attr/current\x00') sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") getxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/191, 0xbf) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000880)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) 03:42:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x41300}, 0x48) 03:42:26 executing program 2: getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:26 executing program 4: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) fchdir(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:27 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0) accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getpgid(0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 2506.785303] kauditd_printk_skb: 26 callbacks suppressed [ 2506.785318] audit: type=1400 audit(2000000547.150:3378): avc: denied { prog_load } for pid=28148 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 2506.850793] audit: type=1400 audit(2000000547.160:3379): avc: denied { prog_load } for pid=28148 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:42:27 executing program 4: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) fchdir(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") [ 2506.897858] audit: type=1400 audit(2000000547.200:3380): avc: denied { map } for pid=28152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:27 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") [ 2507.004848] audit: type=1400 audit(2000000547.370:3381): avc: denied { map } for pid=28159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:27 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") [ 2507.226918] audit: type=1400 audit(2000000547.590:3382): avc: denied { map } for pid=28163 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1008) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) [ 2507.696262] audit: type=1400 audit(2000000548.060:3383): avc: denied { map } for pid=28166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:28 executing program 4: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) fchdir(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1008) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) [ 2507.816604] audit: type=1400 audit(2000000548.180:3384): avc: denied { map } for pid=28174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2507.872550] audit: type=1400 audit(2000000548.240:3385): avc: denied { create } for pid=28169 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1008) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) [ 2507.978948] audit: type=1400 audit(2000000548.350:3386): avc: denied { map } for pid=28181 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2508.009119] audit: type=1400 audit(2000000548.380:3387): avc: denied { create } for pid=28165 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:42:29 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:42:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1008) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 03:42:29 executing program 2: getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:29 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) creat(&(0x7f0000000900)='./file0/file0\x00', 0x0) 03:42:29 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) creat(&(0x7f0000000900)='./file0/file0\x00', 0x0) 03:42:29 executing program 1: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:29 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:42:29 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) creat(&(0x7f0000000900)='./file0/file0\x00', 0x0) 03:42:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:42:29 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) creat(&(0x7f0000000900)='./file0/file0\x00', 0x0) 03:42:29 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, &(0x7f0000000240)) 03:42:29 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) socket$nl_route(0x10, 0x3, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:42:30 executing program 1: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:30 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, &(0x7f0000000240)) 03:42:31 executing program 2: getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:31 executing program 1: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:42:31 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, &(0x7f0000000240)) 03:42:32 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:42:32 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) getcwd(&(0x7f0000000000)=""/42, 0x2a) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:42:32 executing program 1: pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:42:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:42:32 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480)) clock_adjtime(0x0, &(0x7f0000000240)) [ 2512.459285] kauditd_printk_skb: 39 callbacks suppressed [ 2512.459300] audit: type=1400 audit(2000000552.830:3427): avc: denied { map } for pid=28278 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2512.515632] audit: type=1400 audit(2000000552.860:3428): avc: denied { map } for pid=28279 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2512.563276] audit: type=1400 audit(2000000552.860:3429): avc: denied { create } for pid=28273 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2512.614098] audit: type=1400 audit(2000000552.860:3430): avc: denied { create } for pid=28273 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2512.639002] audit: type=1400 audit(2000000552.870:3431): avc: denied { map } for pid=28280 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2512.662193] audit: type=1400 audit(2000000552.880:3432): avc: denied { map } for pid=28281 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2512.830961] audit: type=1400 audit(2000000553.200:3433): avc: denied { map } for pid=28282 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161180000000000616200000000000085100000010000009500000000000000bf100000000000006d200000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0x50, &(0x7f0000000080)}, 0x10) 03:42:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="85105ae6b95583a2"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:42:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 2513.223589] audit: type=1400 audit(2000000553.590:3434): avc: denied { map } for pid=28290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2513.253172] audit: type=1400 audit(2000000553.620:3435): avc: denied { prog_load } for pid=28291 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:42:33 executing program 2: getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:42:33 executing program 1: epoll_create(0x1) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0)) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f00000002c0)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffd, 'queue0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r2, r1) 03:42:33 executing program 4: prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") [ 2513.318303] audit: type=1400 audit(2000000553.620:3436): avc: denied { prog_load } for pid=28293 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:42:34 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) dup(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:42:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:42:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 03:42:34 executing program 1: epoll_create(0x1) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0)) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f00000002c0)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e") openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) sysfs$3(0x3) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 03:42:35 executing program 2: r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="0022040009ffffebffffff1ce7b306feffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae6d1ed41101010000000000ed7449b842f3941868b93396edd653be8ad8c8e286e509ba01a937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6a", 0x118) 03:42:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 03:42:35 executing program 1: epoll_create(0x1) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0)) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f00000002c0)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:35 executing program 2: r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) 03:42:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e") openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) sysfs$3(0x3) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 03:42:36 executing program 1: epoll_create(0x1) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0)) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000440), 0x0) syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000640)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f00000002c0)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:42:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 03:42:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setopts(0x420b, r2, 0x8, 0x907000) 03:42:37 executing program 2: r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) 03:42:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e") openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) sysfs$3(0x3) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 03:42:37 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) 03:42:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e") openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) sysfs$3(0x3) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) [ 2518.025588] kauditd_printk_skb: 25 callbacks suppressed [ 2518.025603] audit: type=1400 audit(2000000558.390:3462): avc: denied { create } for pid=28376 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2518.161386] audit: type=1400 audit(2000000558.530:3463): avc: denied { map } for pid=28388 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2518.286914] audit: type=1400 audit(2000000558.650:3464): avc: denied { map } for pid=28391 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2518.352917] audit: type=1400 audit(2000000558.720:3465): avc: denied { map } for pid=28393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2518.394618] audit: type=1400 audit(2000000558.760:3466): avc: denied { map } for pid=28394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:38 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) 03:42:38 executing program 3: alarm(0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000340)) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) semget(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=0xffffffffffffffff, 0x4) close(0xffffffffffffffff) pipe2(&(0x7f0000000680), 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) io_setup(0x0, &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000840)='wchan\x00') eventfd2(0x0, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000540)=""/153) syz_execute_func(&(0x7f00000004c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:42:38 executing program 2: r0 = socket$inet6(0xa, 0x800000806, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118) 03:42:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setopts(0x420b, r2, 0x8, 0x907000) [ 2518.581575] audit: type=1400 audit(2000000558.950:3467): avc: denied { map } for pid=28397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setopts(0x420b, r2, 0x8, 0x907000) 03:42:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) [ 2519.189109] audit: type=1400 audit(2000000559.560:3468): avc: denied { map } for pid=28414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2519.306573] audit: type=1400 audit(2000000559.670:3469): avc: denied { map } for pid=28417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:39 executing program 3: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10) 03:42:39 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) [ 2519.581661] audit: type=1400 audit(2000000559.950:3470): avc: denied { map } for pid=28421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2519.673348] audit: type=1400 audit(2000000560.040:3471): avc: denied { map } for pid=28424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:40 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) 03:42:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setopts(0x420b, r2, 0x8, 0x907000) 03:42:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:41 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0) 03:42:42 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0) 03:42:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x10, 0x100000002, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:42 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0) 03:42:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:42 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0) 03:42:42 executing program 3: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10) 03:42:42 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) [ 2522.534322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 2522.555904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 2523.187860] kauditd_printk_skb: 12 callbacks suppressed [ 2523.187876] audit: type=1400 audit(2000000563.550:3484): avc: denied { map } for pid=28489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2523.324249] syz-executor4 (28469) used greatest stack depth: 12600 bytes left [ 2523.396417] audit: type=1400 audit(2000000563.760:3485): avc: denied { map } for pid=28494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x10, 0x100000002, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:43 executing program 3: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10) 03:42:43 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) [ 2523.604176] audit: type=1400 audit(2000000563.970:3486): avc: denied { map } for pid=28502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2523.712301] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 03:42:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x10, 0x100000002, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) [ 2524.188990] audit: type=1400 audit(2000000564.550:3487): avc: denied { map } for pid=28512 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2524.244058] audit: type=1400 audit(2000000564.610:3488): avc: denied { map } for pid=28514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2524.605820] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 2524.921671] audit: type=1400 audit(2000000565.290:3489): avc: denied { map } for pid=28521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2524.990500] audit: type=1400 audit(2000000565.360:3490): avc: denied { map } for pid=28522 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100)) 03:42:45 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:45 executing program 3: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10) 03:42:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x10, 0x100000002, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:42:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) [ 2525.138411] audit: type=1400 audit(2000000565.500:3491): avc: denied { map } for pid=28525 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2525.232761] audit: type=1400 audit(2000000565.600:3492): avc: denied { map } for pid=28532 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2525.274680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 2525.751401] audit: type=1400 audit(2000000566.120:3493): avc: denied { map } for pid=28542 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:46 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:46 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:47 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffb) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x22, 0x0, 0xffffffffffffff9c}, 0x2c) 03:42:47 executing program 2: prctl$setptracer(0x59616d61, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:47 executing program 4: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:48 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:48 executing program 4: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:48 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000") ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 2528.404381] kauditd_printk_skb: 10 callbacks suppressed [ 2528.404396] audit: type=1400 audit(2000000568.770:3504): avc: denied { map } for pid=28602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2528.439544] audit: type=1400 audit(2000000568.780:3505): avc: denied { map } for pid=28601 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:49 executing program 4: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:49 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000") ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 2529.289539] audit: type=1400 audit(2000000569.660:3506): avc: denied { map } for pid=28616 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2529.351159] audit: type=1400 audit(2000000569.720:3507): avc: denied { map } for pid=28618 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:50 executing program 4: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:50 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000") ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 2530.210902] audit: type=1400 audit(2000000570.580:3508): avc: denied { map } for pid=28627 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2530.961441] audit: type=1400 audit(2000000571.330:3509): avc: denied { map } for pid=28635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:51 executing program 2: prctl$setptracer(0x59616d61, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:51 executing program 4: prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) getpgid(0x0) wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)) getpgrp(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) [ 2531.056472] audit: type=1400 audit(2000000571.420:3510): avc: denied { map } for pid=28638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2531.134666] audit: type=1400 audit(2000000571.500:3511): avc: denied { map } for pid=28643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:51 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000") ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 2531.169806] audit: type=1400 audit(2000000571.540:3512): avc: denied { map } for pid=28644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2531.209592] audit: type=1400 audit(2000000571.580:3513): avc: denied { map } for pid=28647 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:52 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000005, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:42:52 executing program 4: prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) getpgid(0x0) wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)) getpgrp(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) 03:42:52 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0xfffffffffffffe4d) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0x3bf) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) socket(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) dup(0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000240), &(0x7f00000002c0)=""/168, 0x0, 0x0, 0x0, &(0x7f0000000380)}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000007c0)}, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000680), 0x4) 03:42:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd) 03:42:53 executing program 1: prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") [ 2533.436309] kauditd_printk_skb: 11 callbacks suppressed [ 2533.436322] audit: type=1400 audit(2000000573.800:3525): avc: denied { map } for pid=28682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:54 executing program 1: prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") 03:42:54 executing program 4: prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) getpgid(0x0) wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)) getpgrp(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) [ 2534.511603] audit: type=1400 audit(2000000574.880:3526): avc: denied { map } for pid=28687 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2534.611399] audit: type=1400 audit(2000000574.980:3527): avc: denied { map } for pid=28695 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2534.778978] audit: type=1400 audit(2000000575.150:3528): avc: denied { map } for pid=28697 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:55 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3) 03:42:55 executing program 2: prctl$setptracer(0x59616d61, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:55 executing program 1: prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") [ 2535.328995] audit: type=1400 audit(2000000575.700:3529): avc: denied { map } for pid=28701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2535.387746] audit: type=1400 audit(2000000575.750:3530): avc: denied { map } for pid=28704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2535.435899] audit: type=1400 audit(2000000575.800:3531): avc: denied { map } for pid=28706 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:56 executing program 1: prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f") [ 2536.221483] audit: type=1400 audit(2000000576.590:3532): avc: denied { map } for pid=28708 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) shutdown(0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) [ 2537.095180] audit: type=1400 audit(2000000577.460:3533): avc: denied { map } for pid=28711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2537.184666] audit: type=1400 audit(2000000577.500:3534): avc: denied { map } for pid=28713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:57 executing program 4: prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) getpgid(0x0) wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)) getpgrp(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) 03:42:57 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3) 03:42:57 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28) getgroups(0x0, &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:42:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffe1, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0xb0, 0xe4, 0x8002, 0x5, 0x9, 0x0, 0x9, 0x7c71b77, r2}, &(0x7f0000000280)=0x20) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000007c0)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setxattr(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)=@random={'user.', 'gretap0\x00'}, &(0x7f0000000a80)='*vmnet0\x00', 0x8, 0x1) futimesat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) write$P9_RUNLINKAT(r1, &(0x7f0000000780)={0x7, 0x4d, 0x1}, 0x7) keyctl$restrict_keyring(0x1d, r4, &(0x7f00000003c0)='blacklist\x00', &(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00') sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x200000000020, 0x8000}, &(0x7f00000001c0)=0x10) sendmsg$can_bcm(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0x10, &(0x7f0000000980)={&(0x7f0000000900)={0x7, 0x1, 0x234, {}, {0x0, 0x7530}, {0x4, 0x4, 0x9, 0x4}, 0x1, @can={{0x3, 0x200000000000, 0xfc50, 0x5}, 0x5, 0x1, 0x0, 0x0, "aa50b98ae9709e48"}}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x80) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xb5, 0x400, {0x0, @in={{0x2, 0x4e21, @remote}}, 0x9, 0x4, 0x4, 0x7}}, &(0x7f0000000400)=0xb0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() write$P9_RGETATTR(r1, &(0x7f00000005c0)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x2, 0x6}, 0x4, r5, r6, 0x100, 0x3, 0x8000, 0x8e, 0x8a2, 0x9, 0x0, 0xffff, 0x5, 0x0, 0xa4e1, 0x100000000, 0x4, 0x7, 0x7}}, 0xa0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000009080)={0x0, 0x7}, &(0x7f00000090c0)=0x8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x3, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000740)={'gretap0\x00', {0x2, 0x4e22, @rand_addr=0x318}}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000009100)=ANY=[], &(0x7f0000009140)) 03:42:58 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3) 03:42:58 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:42:58 executing program 2: prctl$setptracer(0x59616d61, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:42:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:42:58 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3) 03:42:58 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = getpgrp(0x0) migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7) [ 2538.443073] kauditd_printk_skb: 11 callbacks suppressed [ 2538.443087] audit: type=1400 audit(2000000578.810:3546): avc: denied { map } for pid=28751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:42:58 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = getpgrp(0x0) migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7) 03:42:58 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = getpgrp(0x0) migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7) 03:42:59 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = getpgrp(0x0) migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7) [ 2538.645602] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:42:59 executing program 0: socket$unix(0x1, 0x2, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map}) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) [ 2538.718574] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2538.823393] audit: type=1400 audit(2000000579.190:3547): avc: denied { map } for pid=28769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2538.897399] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2538.922878] audit: type=1400 audit(2000000579.290:3548): avc: denied { map } for pid=28773 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2538.950338] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2539.032513] audit: type=1400 audit(2000000579.400:3549): avc: denied { map } for pid=28776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2539.119573] audit: type=1400 audit(2000000579.490:3550): avc: denied { create } for pid=28774 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2539.334459] audit: type=1400 audit(2000000579.700:3551): avc: denied { map } for pid=28779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:00 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28) getgroups(0x0, &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) 03:43:00 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:43:00 executing program 2: sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/47) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000440)=0x90) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}}, &(0x7f0000000540)=0xb0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000580)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="66b85f008ee0660fc62b5f67d9f8f3af0f30c4e27d908cd43437063fd93c11f30f38f61d79450000b850a400000f23d00f21f835100000040f23f866bad004ec", 0x40}], 0x1, 0x0, &(0x7f0000000080), 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000680)=""/37) perf_event_open(&(0x7f000001d000)={0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600), 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 2539.686627] audit: type=1326 audit(2000000580.030:3552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000 [ 2539.778444] audit: type=1326 audit(2000000580.050:3553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000 [ 2539.804410] audit: type=1326 audit(2000000580.060:3554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000 03:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) [ 2539.969406] audit: type=1326 audit(2000000580.060:3555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000 03:43:00 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) 03:43:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) 03:43:01 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) [ 2541.643321] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2541.667363] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:43:02 executing program 0: socket$unix(0x1, 0x2, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map}) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) 03:43:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28) getgroups(0x0, &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:43:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) [ 2542.513631] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2542.528983] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:43:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:43:03 executing program 0: socket$unix(0x1, 0x2, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map}) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) [ 2542.760609] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 2542.838520] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 03:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0) 03:43:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28) getgroups(0x0, &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:43:04 executing program 0: socket$unix(0x1, 0x2, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map}) fstat(0xffffffffffffffff, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) [ 2543.725812] kauditd_printk_skb: 366 callbacks suppressed [ 2543.725825] audit: type=1400 audit(2000000584.090:3922): avc: denied { map } for pid=28843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2543.899684] audit: type=1400 audit(2000000584.270:3923): avc: denied { create } for pid=28844 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2544.322355] audit: type=1400 audit(2000000584.690:3924): avc: denied { map } for pid=28847 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2544.647729] audit: type=1400 audit(2000000585.010:3925): avc: denied { map } for pid=28848 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:10 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x40000013f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300)) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20) write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd}) socket(0x15, 0x0, 0x3ff) sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000}) 03:43:10 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}}) 03:43:10 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getuid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getegid() lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffff9c, &(0x7f0000000e80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:43:10 executing program 5: getrusage(0x1, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:43:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}}) write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 03:43:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}}) write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 03:43:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}}) [ 2549.929536] audit: type=1400 audit(2000000590.300:3926): avc: denied { map } for pid=28865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}}) write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 03:43:10 executing program 5: getrusage(0x1, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 2550.032399] audit: type=1400 audit(2000000590.400:3927): avc: denied { map } for pid=28869 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2550.056616] audit: type=1326 audit(2000000590.420:3928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28859 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 2550.117947] audit: type=1400 audit(2000000590.480:3929): avc: denied { map } for pid=28870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2550.149982] audit: type=1400 audit(2000000590.510:3930): avc: denied { map } for pid=28871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}}) write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 03:43:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}}) [ 2550.342519] audit: type=1400 audit(2000000590.710:3931): avc: denied { map } for pid=28879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2550.403390] audit: type=1400 audit(2000000590.770:3932): avc: denied { map } for pid=28883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2550.511233] audit: type=1400 audit(2000000590.880:3933): avc: denied { map } for pid=28886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2550.573744] audit: type=1400 audit(2000000590.940:3934): avc: denied { map } for pid=28887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:11 executing program 1: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2550.647971] audit: type=1400 audit(2000000591.010:3935): avc: denied { map } for pid=28891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:11 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:11 executing program 5: getrusage(0x1, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:43:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}}) 03:43:11 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x40000013f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300)) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20) write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd}) socket(0x15, 0x0, 0x3ff) sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000}) 03:43:11 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getuid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getegid() lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffff9c, &(0x7f0000000e80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:43:12 executing program 1: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:12 executing program 0: getpid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getpgid(0x0) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540)) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f") 03:43:12 executing program 5: getrusage(0x1, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:43:12 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x40000013f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300)) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20) write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd}) socket(0x15, 0x0, 0x3ff) sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000}) 03:43:12 executing program 5: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480)) 03:43:12 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:12 executing program 1: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:13 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getuid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getegid() lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffff9c, &(0x7f0000000e80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:43:13 executing program 0: getpid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getpgid(0x0) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540)) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f") 03:43:13 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x40000013f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300)) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20) write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd}) socket(0x15, 0x0, 0x3ff) sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe) accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000}) 03:43:13 executing program 1: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:14 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getuid() getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getegid() lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffff9c, &(0x7f0000000e80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:43:14 executing program 5: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480)) 03:43:14 executing program 4: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:43:14 executing program 1: memfd_create(&(0x7f00000008c0)="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", 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000004c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgroups(0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb) fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}}) 03:43:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 03:43:15 executing program 0: getpid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getpgid(0x0) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540)) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f") 03:43:15 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2554.954942] kauditd_printk_skb: 21 callbacks suppressed [ 2554.954958] audit: type=1400 audit(2000000595.320:3957): avc: denied { map } for pid=28975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:15 executing program 1: memfd_create(&(0x7f00000008c0)="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", 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000004c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgroups(0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb) fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}}) [ 2555.269969] audit: type=1400 audit(2000000595.640:3958): avc: denied { map } for pid=28980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2555.399767] audit: type=1400 audit(2000000595.770:3959): avc: denied { create } for pid=28981 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2555.449287] audit: type=1400 audit(2000000595.800:3960): avc: denied { prog_load } for pid=28981 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:43:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 03:43:16 executing program 1: memfd_create(&(0x7f00000008c0)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000004c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgroups(0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb) fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}}) [ 2556.134722] audit: type=1400 audit(2000000596.500:3961): avc: denied { map } for pid=28993 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:16 executing program 5: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480)) [ 2556.302736] audit: type=1400 audit(2000000596.670:3962): avc: denied { map } for pid=29000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:16 executing program 1: memfd_create(&(0x7f00000008c0)="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", 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000004c0)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgroups(0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb) fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}}) [ 2556.392324] audit: type=1400 audit(2000000596.760:3963): avc: denied { map } for pid=29002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2556.518932] audit: type=1400 audit(2000000596.890:3964): avc: denied { create } for pid=28987 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2556.681150] audit: type=1400 audit(2000000597.050:3965): avc: denied { create } for pid=29003 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2556.706093] audit: type=1400 audit(2000000597.050:3966): avc: denied { prog_load } for pid=29003 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:43:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 03:43:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240), 0x8) 03:43:17 executing program 1: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:43:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0)) 03:43:18 executing program 0: getpid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getpgid(0x0) gettid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540)) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f") 03:43:18 executing program 3: clock_gettime(0x7, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee) getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) 03:43:18 executing program 1: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:43:19 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000940)={@dev}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c40)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e40)={@remote, @multicast1}, &(0x7f0000000e80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000028c0), &(0x7f0000002900)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002940)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'veth0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002c40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004540)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004e40)={&(0x7f0000004580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004d80)}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000005080)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000009280), 0x0, 0x0, &(0x7f0000009440)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009980)={@remote, @rand_addr}, &(0x7f00000099c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f40)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012280)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000012380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000123c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000012400)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000124c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000012500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000012540)={@dev}, &(0x7f0000012580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000125c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000012600)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000012f00)={&(0x7f0000000500), 0xc, &(0x7f0000012ec0)={&(0x7f0000012640)={0x14}, 0x14}}, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:43:19 executing program 1: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:43:20 executing program 1: memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) syncfs(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0)) fstat(0xffffffffffffffff, &(0x7f0000001e00)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002580)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) getpid() geteuid() stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:43:20 executing program 5: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480)) [ 2560.025902] kauditd_printk_skb: 7 callbacks suppressed [ 2560.025916] audit: type=1400 audit(2000000600.390:3974): avc: denied { map } for pid=29044 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:20 executing program 4: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 2560.109944] audit: type=1400 audit(2000000600.480:3975): avc: denied { create } for pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2560.163580] audit: type=1400 audit(2000000600.530:3976): avc: denied { map } for pid=29050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:20 executing program 4: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 2560.294837] audit: type=1400 audit(2000000600.660:3977): avc: denied { create } for pid=29048 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2560.444325] audit: type=1400 audit(2000000600.810:3978): avc: denied { create } for pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2560.482527] audit: type=1400 audit(2000000600.850:3979): avc: denied { create } for pid=29053 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:21 executing program 2: unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='com.apple.system.Security\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) chroot(&(0x7f0000000280)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000240)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000540)=""/170, 0xaa) pipe2(&(0x7f0000000000), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'rr\x00'}, 0x2c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000140)={0x0, @aes128, 0x0, "14298bdb68db4eac"}) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 03:43:21 executing program 4: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 2560.653387] audit: type=1400 audit(2000000601.010:3980): avc: denied { create } for pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:21 executing program 4: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) clock_gettime(0x0, &(0x7f0000004680)) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 2560.878995] audit: type=1400 audit(2000000601.250:3981): avc: denied { create } for pid=29057 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2560.935900] audit: type=1400 audit(2000000601.290:3982): avc: denied { map } for pid=29062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2560.968331] audit: type=1400 audit(2000000601.300:3983): avc: denied { map } for pid=29060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:21 executing program 3: clock_gettime(0x7, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee) getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) 03:43:21 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) socket$packet(0x11, 0x0, 0x300) 03:43:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r1) 03:43:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)) 03:43:21 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}}) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:43:22 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) socket$packet(0x11, 0x0, 0x300) 03:43:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r1) 03:43:22 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}}) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:43:22 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240), 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000c80)='./file0/file0\x00', &(0x7f0000000cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d40)) geteuid() getgroups(0x0, &(0x7f0000000d80)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getgid() accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8) getegid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001000)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002700)) getresuid(&(0x7f0000002740), &(0x7f0000002780), &(0x7f00000027c0)) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d80)={{{@in6=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000002e80)=0xe8) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002f80)) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c40)={{{@in=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003e00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000003f40)=0xe8) lstat(&(0x7f0000003f80)='./file0\x00', &(0x7f0000003fc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000004140)=0xe8) lstat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005b80)) getuid() getresgid(&(0x7f0000005bc0), &(0x7f0000005c00), &(0x7f0000005c40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getuid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14) gettid() syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:43:22 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) inotify_init() signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400)) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) 03:43:23 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) socket$packet(0x11, 0x0, 0x300) 03:43:23 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}}) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:43:24 executing program 3: clock_gettime(0x7, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee) getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) 03:43:24 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) socket$packet(0x11, 0x0, 0x300) 03:43:24 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}}) prctl$intptr(0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:43:24 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc) gettid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:43:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700)) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:43:25 executing program 3: clock_gettime(0x7, &(0x7f0000000140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee) getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) 03:43:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r1) 03:43:25 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getegid() lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getegid() getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8) getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00)) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:43:25 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) inotify_init() signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400)) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) [ 2565.362936] kauditd_printk_skb: 23 callbacks suppressed [ 2565.362951] audit: type=1400 audit(2000000605.730:4007): avc: denied { map } for pid=29144 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:25 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc) gettid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 2565.529429] audit: type=1400 audit(2000000605.900:4008): avc: denied { map } for pid=29151 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:26 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getegid() lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getegid() getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8) getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00)) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 2565.734997] audit: type=1400 audit(2000000606.100:4009): avc: denied { prog_load } for pid=29138 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:43:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r1) [ 2566.168927] audit: type=1400 audit(2000000606.540:4010): avc: denied { create } for pid=29162 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:26 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc) gettid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 2566.367045] audit: type=1400 audit(2000000606.730:4011): avc: denied { map } for pid=29168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2566.403572] audit: type=1400 audit(2000000606.770:4012): avc: denied { map } for pid=29169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2566.476201] audit: type=1400 audit(2000000606.840:4013): avc: denied { map } for pid=29172 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2566.501149] audit: type=1400 audit(2000000606.870:4014): avc: denied { map } for pid=29173 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2566.526992] audit: type=1400 audit(2000000606.900:4015): avc: denied { create } for pid=29162 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:27 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getegid() lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getegid() getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8) getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00)) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:43:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700)) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:43:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0) [ 2566.702913] audit: type=1400 audit(2000000607.070:4016): avc: denied { map } for pid=29178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:27 executing program 1: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc) gettid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:43:28 executing program 1: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getuid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) geteuid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getuid() openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000001700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:28 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getegid() lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getegid() getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8) getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00)) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:43:28 executing program 0: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:30 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) inotify_init() signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400)) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) 03:43:30 executing program 1: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getuid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) geteuid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getuid() openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000001700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:30 executing program 4: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) 03:43:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0) 03:43:30 executing program 4: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) 03:43:30 executing program 4: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) [ 2570.524731] kauditd_printk_skb: 13 callbacks suppressed [ 2570.524744] audit: type=1400 audit(2000000610.890:4030): avc: denied { map } for pid=29222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2570.564692] audit: type=1400 audit(2000000610.910:4031): avc: denied { create } for pid=29209 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700)) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:43:31 executing program 1: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getuid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) geteuid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getuid() openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000001700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:31 executing program 4: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) 03:43:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0) 03:43:31 executing program 0: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) [ 2570.644649] audit: type=1400 audit(2000000611.010:4032): avc: denied { map } for pid=29226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2570.671501] audit: type=1400 audit(2000000611.010:4033): avc: denied { prog_load } for pid=29224 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 2570.713796] audit: type=1400 audit(2000000611.080:4034): avc: denied { map } for pid=29227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2570.760959] audit: type=1400 audit(2000000611.130:4035): avc: denied { prog_load } for pid=29233 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:43:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0) 03:43:31 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) gettid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) inotify_init() signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400)) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) 03:43:31 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) [ 2571.304723] audit: type=1400 audit(2000000611.670:4036): avc: denied { map } for pid=29238 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2571.328670] audit: type=1400 audit(2000000611.670:4037): avc: denied { map } for pid=29237 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:31 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) [ 2571.425274] audit: type=1400 audit(2000000611.790:4038): avc: denied { map } for pid=29243 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:31 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:31 executing program 1: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) getuid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) geteuid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getuid() openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000001700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 2571.541906] audit: type=1400 audit(2000000611.910:4040): avc: denied { prog_load } for pid=29242 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:43:32 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700)) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:43:32 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) 03:43:32 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:32 executing program 0: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:32 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)="7dbf2a78892d764fd34a556b884fc44e1d3903c25662e82a6cdc43eba6e41224d1a37a7a85f41eccfcf6b65f5fcaef1b9d0e50771b4e5b81921550c50e061708af0a75d844397a9e52086a68cea96adaf842848d122eeb959a0ab24dc7d1874ec54f7322fc0cfafe", 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x51, r1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000e80)=@ethtool_per_queue_op}) 03:43:33 executing program 0: syz_open_pts(0xffffffffffffff9c, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setstatus(r1, 0x4, 0x800) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8) ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070") ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0xadc) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(r0, 0x40b) ftruncate(r2, 0x2007fff) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2) sendfile(r1, r2, &(0x7f0000000600), 0x800100000000) fadvise64(r2, 0x0, 0x0, 0x2) fchmod(r0, 0x80) 03:43:33 executing program 4: keyctl$dh_compute(0xa, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:43:33 executing program 5: lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)}) 03:43:33 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30) clock_gettime(0x0, &(0x7f0000000440)) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64) waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:43:33 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30) clock_gettime(0x0, &(0x7f0000000440)) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64) waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:43:33 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) [ 2572.958961] binder: 29294:29295 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2572.989873] binder: 29294:29295 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 2572.997557] binder: 29294:29295 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 2573.004781] binder: 29294:29295 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 2573.012887] binder: 29294:29295 got reply transaction with no transaction stack [ 2573.025194] binder: 29294:29295 transaction failed 29201/-71, size 0-0 line 2762 [ 2573.034924] binder: 29294:29295 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2573.042991] binder: 29294:29301 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 2573.050323] binder: 29294:29301 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 2573.057694] binder: 29294:29301 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 2573.066870] binder: undelivered TRANSACTION_ERROR: 29201 [ 2573.077553] binder: 29294:29301 got reply transaction with no transaction stack [ 2573.085336] binder: 29294:29301 transaction failed 29201/-71, size 0-0 line 2762 [ 2573.093363] binder: undelivered TRANSACTION_ERROR: 29201 03:43:33 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30) clock_gettime(0x0, &(0x7f0000000440)) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64) waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:43:33 executing program 4: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000001640)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) geteuid() getegid() getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) prctl$setname(0xf, &(0x7f0000001600)='^\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:43:33 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14) 03:43:33 executing program 5: lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)}) 03:43:33 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)}) r0 = semget$private(0x0, 0x7, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4) bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0) sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226) 03:43:33 executing program 2: memfd_create(&(0x7f0000000340)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00', 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000380)=0x4) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) geteuid() lstat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0)) geteuid() lstat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./bus\x00', &(0x7f0000000e40)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ec0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in6, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001000)=0xe8) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000001100)}, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:43:33 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30) clock_gettime(0x0, &(0x7f0000000440)) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64) waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2573.746221] binder: 29319:29324 Acquire 1 refcount change on invalid ref 0 ret -22 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2573.804004] binder: 29319:29339 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2573.963668] binder: 29319:29324 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2574.027214] binder: 29319:29324 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 2574.046962] binder: 29319:29324 got reply transaction with no transaction stack [ 2574.124109] binder: 29319:29324 transaction failed 29201/-71, size 0-0 line 2762 03:43:34 executing program 4: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000001640)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) geteuid() getegid() getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) prctl$setname(0xf, &(0x7f0000001600)='^\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") [ 2574.263855] binder: undelivered TRANSACTION_ERROR: 29201 03:43:34 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14) 03:43:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 03:43:34 executing program 2: capset(&(0x7f0000000000)={0x4000019980330}, &(0x7f0000001fe8)) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) 03:43:34 executing program 5: lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)}) 03:43:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:35 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2574.634042] binder: 29369:29373 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2574.695208] binder: 29369:29376 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 2574.857494] binder: 29369:29379 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 03:43:35 executing program 4: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000001640)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) geteuid() getegid() getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) prctl$setname(0xf, &(0x7f0000001600)='^\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") [ 2575.121126] binder: 29369:29379 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 2575.158676] binder: 29369:29379 got reply transaction with no transaction stack 03:43:35 executing program 2: keyctl$setperm(0x14, 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000240)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}}, 0x0) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000001380)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) getresuid(&(0x7f0000003b00), &(0x7f0000003b40), &(0x7f0000003b80)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)) getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000061c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) [ 2575.166233] binder: 29369:29379 transaction failed 29201/-71, size 0-0 line 2762 03:43:35 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2575.536780] kauditd_printk_skb: 40 callbacks suppressed [ 2575.536793] audit: type=1400 audit(2000000615.900:4080): avc: denied { map } for pid=29390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2575.662679] audit: type=1400 audit(2000000616.030:4081): avc: denied { map } for pid=29394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:36 executing program 4: openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000001640)='.\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a) chdir(&(0x7f0000000080)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35) recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140)) accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) geteuid() getegid() getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) prctl$setname(0xf, &(0x7f0000001600)='^\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:43:36 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 2576.357473] audit: type=1400 audit(2000000616.720:4082): avc: denied { map } for pid=29393 comm="syz-executor3" path="/root/syzkaller-testdir504980132/syzkaller.qDFCFH/1568/bus" dev="sda1" ino=17154 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 [ 2576.393467] binder: undelivered TRANSACTION_ERROR: 29201 [ 2576.410911] audit: type=1400 audit(2000000616.780:4083): avc: denied { map } for pid=29400 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:37 executing program 4: clock_gettime(0x4, &(0x7f0000001140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/autofs\x00', 0x0, 0x0) dup(0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000a00)='/dev/vcs#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000980)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "70144461f373c9de3fbcd2d8511517a6132c49ca52f5766e7188046d66a23a1d0cf71efb7e26bfcb42a21c09940ebf684568b0857fcd4563d6e7638c2b1f27e4", "b65a6d478bb1ac13a889648b91c5db11c6a16ce22d17d490029b1a2d64c9ab70b8845545a793e430b78a4287134aa04247f14f762bdef9b0942cb31c39369e2f", "4a7f3afd9effde715ba1939252b2bf66679f9f76c9a6f93ab63f13f668799df8"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000740)=0x14) gettid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000e80)) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) syz_open_dev$usb(&(0x7f0000000780)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) gettid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000004340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000043c0)) getgroups(0x0, &(0x7f0000004400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000046c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 2576.932245] audit: type=1400 audit(2000000617.280:4084): avc: denied { map } for pid=29393 comm="syz-executor3" path="/root/syzkaller-testdir504980132/syzkaller.qDFCFH/1568/bus" dev="sda1" ino=17154 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 03:43:37 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14) 03:43:37 executing program 5: lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1) syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)}) [ 2577.001881] audit: type=1400 audit(2000000617.370:4085): avc: denied { create } for pid=29408 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2577.061926] audit: type=1400 audit(2000000617.430:4086): avc: denied { map } for pid=29411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000), 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) [ 2577.111760] audit: type=1400 audit(2000000617.480:4087): avc: denied { map } for pid=29413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCFLSH(r0, 0x540b, 0x0) [ 2577.185144] audit: type=1400 audit(2000000617.550:4088): avc: denied { map } for pid=29414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2577.230664] binder: 29415:29416 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2577.274709] audit: type=1400 audit(2000000617.640:4089): avc: denied { map } for pid=29419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2577.328340] binder: 29415:29422 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 2577.340267] binder: 29415:29416 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 2577.347501] binder: 29415:29416 BC_DEAD_BINDER_DONE 0000000000000001 not found [ 2577.347524] binder: 29415:29416 got reply transaction with no transaction stack [ 2577.347543] binder: 29415:29416 transaction failed 29201/-71, size 0-0 line 2762 [ 2577.360000] binder: undelivered TRANSACTION_ERROR: 29201 03:43:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:37 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:43:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000), 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) 03:43:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCFLSH(r0, 0x540b, 0x0) 03:43:37 executing program 5: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000), 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) 03:43:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000), 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) 03:43:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:38 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14) 03:43:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCFLSH(r0, 0x540b, 0x0) 03:43:38 executing program 1: rt_sigpending(&(0x7f0000000680), 0x1b3) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00'}, 0x35a) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000480)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000004c0)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8) accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000540), 0x4) 03:43:38 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) times(&(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:43:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:40 executing program 5: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:40 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) times(&(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:43:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) ioctl$TCFLSH(r0, 0x540b, 0x0) 03:43:40 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) times(&(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:43:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) [ 2580.646607] kauditd_printk_skb: 21 callbacks suppressed [ 2580.646624] audit: type=1400 audit(2000000621.010:4111): avc: denied { map } for pid=29484 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3336/bus" dev="sda1" ino=17151 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 [ 2581.000107] audit: type=1400 audit(2000000621.370:4112): avc: denied { map } for pid=29488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:41 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) times(&(0x7f0000000640)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 2581.399558] audit: type=1400 audit(2000000621.770:4113): avc: denied { map } for pid=29489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2581.445028] audit: type=1400 audit(2000000621.800:4114): avc: denied { create } for pid=29490 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) 03:43:41 executing program 4: keyctl$setperm(0x8, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240)) syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) 03:43:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) lstat(&(0x7f0000001b80)='./file1\x00', &(0x7f0000001bc0)) getpgrp(0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003140)=0xe8) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003280)={&(0x7f0000000400)=@proc, 0xc, &(0x7f0000002fc0), 0x0, &(0x7f0000003240)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@loopback}, 0x9a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000000c0)='trusted.overlay.upper\x00', 0xffffffffffffff9c}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 2581.612944] audit: type=1400 audit(2000000621.980:4115): avc: denied { map } for pid=29493 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2581.695807] audit: type=1400 audit(2000000622.060:4116): avc: denied { map } for pid=29496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2581.914599] audit: type=1400 audit(2000000622.280:4117): avc: denied { create } for pid=29494 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:42 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) getpgid(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0) [ 2582.364674] audit: type=1400 audit(2000000622.730:4118): avc: denied { map } for pid=29499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2582.519783] audit: type=1400 audit(2000000622.890:4119): avc: denied { create } for pid=29500 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 2582.550276] audit: type=1400 audit(2000000622.920:4120): avc: denied { create } for pid=29500 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:43:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2}) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900) 03:43:43 executing program 4: keyctl$setperm(0x8, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240)) syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) 03:43:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) 03:43:43 executing program 5: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:43:43 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) getpgid(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0) 03:43:44 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) getpgid(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0) 03:43:44 executing program 4: keyctl$setperm(0x8, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240)) syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) 03:43:45 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) getpgid(0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0) 03:43:45 executing program 4: keyctl$setperm(0x8, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240)) syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) 03:43:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000001c0)=@req3={0xe1f, 0x0, 0x3}, 0x9ed27b770768daeb) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:43:46 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000000), 0x1c9) r2 = open(&(0x7f0000002000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b8) sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 03:43:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) memfd_create(&(0x7f00000008c0)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000700)=""/252) getgroups(0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0x0, 0x1a0, 0x1a0, 0x0, 0xd0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x5, &(0x7f00000004c0), {[{{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @multicast2, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast2, @local, @gre_key, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @empty, @rand_addr, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000006c0)) pipe2$9p(&(0x7f0000000240), 0x0) [ 2586.024379] kauditd_printk_skb: 17 callbacks suppressed [ 2586.024394] audit: type=1400 audit(2000000626.390:4138): avc: denied { map } for pid=29549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 03:43:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0}) 03:43:46 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="2400000020002553075f0165ff72fc2281000000001000220ee1000c08000f0000001700", 0x24) [ 2586.211660] audit: type=1400 audit(2000000626.580:4139): avc: denied { map } for pid=29555 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2586.284207] audit: type=1400 audit(2000000626.650:4140): avc: denied { map } for pid=29556 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 2586.783299] ================================================================== [ 2586.790946] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0 [ 2586.796925] Read of size 8 at addr ffff8801701e7ab0 by task syz-executor0/29559 [ 2586.804365] [ 2586.805999] CPU: 1 PID: 29559 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #12 [ 2586.813275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2586.822625] Call Trace: [ 2586.825265] dump_stack+0x1c4/0x2b4 [ 2586.828906] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2586.834109] ? printk+0xa7/0xcf [ 2586.837394] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 2586.842159] print_address_description.cold.8+0x9/0x1ff [ 2586.847523] kasan_report.cold.9+0x242/0x309 [ 2586.851929] ? sock_i_ino+0x94/0xa0 [ 2586.855561] __asan_report_load8_noabort+0x14/0x20 [ 2586.860493] sock_i_ino+0x94/0xa0 [ 2586.864061] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 2586.868745] ? tipc_diag_dump+0x30/0x30 [ 2586.872723] ? tipc_getname+0x7f0/0x7f0 [ 2586.876708] ? graph_lock+0x170/0x170 [ 2586.880588] ? __lock_sock+0x203/0x350 [ 2586.884494] ? find_held_lock+0x36/0x1c0 [ 2586.888559] ? mark_held_locks+0xc7/0x130 [ 2586.892712] ? __local_bh_enable_ip+0x160/0x260 [ 2586.897385] ? __local_bh_enable_ip+0x160/0x260 [ 2586.902068] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2586.906673] ? trace_hardirqs_on+0xbd/0x310 [ 2586.911000] ? lock_release+0x970/0x970 [ 2586.914978] ? lock_sock_nested+0xe2/0x120 [ 2586.919220] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2586.924241] ? skb_put+0x17b/0x1e0 [ 2586.927780] ? memset+0x31/0x40 [ 2586.931121] ? __nlmsg_put+0x14c/0x1b0 [ 2586.935022] __tipc_add_sock_diag+0x233/0x360 [ 2586.939524] tipc_nl_sk_walk+0x122/0x1d0 [ 2586.943585] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 2586.948873] tipc_diag_dump+0x24/0x30 [ 2586.952682] netlink_dump+0x519/0xd50 [ 2586.956488] ? netlink_broadcast+0x50/0x50 [ 2586.960733] __netlink_dump_start+0x4f1/0x6f0 [ 2586.965234] ? tipc_data_ready+0x3e0/0x3e0 [ 2586.969479] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 2586.974590] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 2586.979263] ? tipc_data_ready+0x3e0/0x3e0 [ 2586.983497] ? tipc_unregister_sysctl+0x20/0x20 [ 2586.988163] ? tipc_ioctl+0x3a0/0x3a0 [ 2586.991968] ? netlink_deliver_tap+0x355/0xf80 [ 2586.996641] sock_diag_rcv_msg+0x31d/0x410 [ 2587.000884] netlink_rcv_skb+0x172/0x440 [ 2587.004946] ? sock_diag_bind+0x80/0x80 [ 2587.008920] ? netlink_ack+0xb80/0xb80 [ 2587.012818] sock_diag_rcv+0x2a/0x40 [ 2587.016537] netlink_unicast+0x5a5/0x760 [ 2587.020614] ? netlink_attachskb+0x9a0/0x9a0 [ 2587.025029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.030572] netlink_sendmsg+0xa18/0xfc0 [ 2587.034648] ? netlink_unicast+0x760/0x760 [ 2587.038895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.044431] ? security_socket_sendmsg+0x94/0xc0 [ 2587.049190] ? netlink_unicast+0x760/0x760 [ 2587.053426] sock_sendmsg+0xd5/0x120 [ 2587.057143] ___sys_sendmsg+0x7fd/0x930 [ 2587.061125] ? __local_bh_enable_ip+0x160/0x260 [ 2587.065799] ? copy_msghdr_from_user+0x580/0x580 [ 2587.070556] ? kasan_check_write+0x14/0x20 [ 2587.074904] ? _raw_spin_unlock_bh+0x30/0x40 [ 2587.079318] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2587.084773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.090311] ? release_sock+0x1ec/0x2c0 [ 2587.094291] ? __fget_light+0x2e9/0x430 [ 2587.098712] ? fget_raw+0x20/0x20 [ 2587.102165] ? __release_sock+0x3a0/0x3a0 [ 2587.106318] ? tipc_nametbl_build_group+0x273/0x360 [ 2587.111337] ? tipc_setsockopt+0x726/0xd70 [ 2587.115597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2587.121143] ? sockfd_lookup_light+0xc5/0x160 [ 2587.125640] __sys_sendmsg+0x11d/0x280 [ 2587.129530] ? __ia32_sys_shutdown+0x80/0x80 [ 2587.133938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2587.139479] ? fput+0x130/0x1a0 [ 2587.142767] ? __x64_sys_futex+0x47f/0x6a0 [ 2587.147003] ? do_syscall_64+0x9a/0x820 [ 2587.150975] ? do_syscall_64+0x9a/0x820 [ 2587.154957] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2587.160413] __x64_sys_sendmsg+0x78/0xb0 [ 2587.164479] do_syscall_64+0x1b9/0x820 [ 2587.168368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2587.173736] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2587.178671] ? trace_hardirqs_on_caller+0x310/0x310 [ 2587.183688] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2587.188700] ? recalc_sigpending_tsk+0x180/0x180 [ 2587.193464] ? kasan_check_write+0x14/0x20 [ 2587.197707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2587.202564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2587.207761] RIP: 0033:0x4572d9 [ 2587.210958] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2587.229863] RSP: 002b:00007f4e81d9ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2587.237575] RAX: ffffffffffffffda RBX: 00007f4e81d9f6d4 RCX: 00000000004572d9 [ 2587.244849] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 2587.252116] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.259381] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2587.266647] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 2587.273927] [ 2587.275553] Allocated by task 29559: [ 2587.279268] save_stack+0x43/0xd0 [ 2587.282717] kasan_kmalloc+0xc7/0xe0 [ 2587.286427] kasan_slab_alloc+0x12/0x20 [ 2587.290401] kmem_cache_alloc+0x12e/0x730 [ 2587.294547] sock_alloc_inode+0x1d/0x260 [ 2587.298612] alloc_inode+0x63/0x190 [ 2587.302239] new_inode_pseudo+0x71/0x1a0 [ 2587.306294] sock_alloc+0x41/0x270 [ 2587.309829] __sock_create+0x175/0x930 [ 2587.313711] __sys_socket+0x106/0x260 [ 2587.317508] __x64_sys_socket+0x73/0xb0 [ 2587.321481] do_syscall_64+0x1b9/0x820 [ 2587.325367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2587.330545] [ 2587.332169] Freed by task 29557: [ 2587.335532] save_stack+0x43/0xd0 [ 2587.338981] __kasan_slab_free+0x102/0x150 [ 2587.343213] kasan_slab_free+0xe/0x10 [ 2587.347012] kmem_cache_free+0x83/0x290 [ 2587.350983] sock_destroy_inode+0x51/0x60 [ 2587.355128] destroy_inode+0x159/0x200 [ 2587.359011] evict+0x5e0/0x980 [ 2587.362198] iput+0x679/0xa90 [ 2587.365312] dentry_unlink_inode+0x461/0x5e0 [ 2587.369719] __dentry_kill+0x44c/0x7a0 [ 2587.373613] dentry_kill+0xc9/0x5a0 [ 2587.377238] dput.part.26+0x660/0x790 [ 2587.381035] dput+0x15/0x20 [ 2587.383996] __fput+0x4cf/0xa30 [ 2587.387267] ____fput+0x15/0x20 [ 2587.390541] task_work_run+0x1e8/0x2a0 [ 2587.394425] exit_to_usermode_loop+0x318/0x380 [ 2587.399005] do_syscall_64+0x6be/0x820 [ 2587.402892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2587.408067] [ 2587.409700] The buggy address belongs to the object at ffff8801701e7a40 [ 2587.409700] which belongs to the cache sock_inode_cache of size 984 [ 2587.422786] The buggy address is located 112 bytes inside of [ 2587.422786] 984-byte region [ffff8801701e7a40, ffff8801701e7e18) [ 2587.434656] The buggy address belongs to the page: [ 2587.439583] page:ffffea0005c079c0 count:1 mapcount:0 mapping:ffff8801d9bfe3c0 index:0xffff8801701e7ffd [ 2587.449030] flags: 0x2fffc0000000100(slab) [ 2587.453264] raw: 02fffc0000000100 ffffea0005c12c88 ffffea0006e61008 ffff8801d9bfe3c0 [ 2587.461146] raw: ffff8801701e7ffd ffff8801701e7140 0000000100000002 0000000000000000 [ 2587.469013] page dumped because: kasan: bad access detected [ 2587.474709] [ 2587.476324] Memory state around the buggy address: [ 2587.481247] ffff8801701e7980: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2587.488603] ffff8801701e7a00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 2587.495966] >ffff8801701e7a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2587.503319] ^ [ 2587.508241] ffff8801701e7b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2587.515593] ffff8801701e7b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2587.522943] ================================================================== [ 2587.530289] Disabling lock debugging due to kernel taint [ 2587.535821] Kernel panic - not syncing: panic_on_warn set ... [ 2587.535821] [ 2587.543189] CPU: 1 PID: 29559 Comm: syz-executor0 Tainted: G B 4.19.0-rc3+ #12 [ 2587.551928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2587.561273] Call Trace: [ 2587.563864] dump_stack+0x1c4/0x2b4 [ 2587.567510] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2587.572701] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2587.577457] panic+0x238/0x4e7 [ 2587.580646] ? add_taint.cold.5+0x16/0x16 [ 2587.584795] ? trace_hardirqs_on+0xb4/0x310 [ 2587.589116] ? trace_hardirqs_on+0xb4/0x310 [ 2587.593442] kasan_end_report+0x47/0x4f [ 2587.597415] kasan_report.cold.9+0x76/0x309 [ 2587.601731] ? sock_i_ino+0x94/0xa0 [ 2587.605353] __asan_report_load8_noabort+0x14/0x20 [ 2587.610277] sock_i_ino+0x94/0xa0 [ 2587.613733] tipc_sk_fill_sock_diag+0x39c/0xd90 [ 2587.618403] ? tipc_diag_dump+0x30/0x30 [ 2587.622375] ? tipc_getname+0x7f0/0x7f0 [ 2587.626354] ? graph_lock+0x170/0x170 [ 2587.630153] ? __lock_sock+0x203/0x350 [ 2587.634037] ? find_held_lock+0x36/0x1c0 [ 2587.638103] ? mark_held_locks+0xc7/0x130 [ 2587.642250] ? __local_bh_enable_ip+0x160/0x260 [ 2587.646913] ? __local_bh_enable_ip+0x160/0x260 [ 2587.651578] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2587.656160] ? trace_hardirqs_on+0xbd/0x310 [ 2587.660473] ? lock_release+0x970/0x970 [ 2587.664442] ? lock_sock_nested+0xe2/0x120 [ 2587.668676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2587.673683] ? skb_put+0x17b/0x1e0 [ 2587.677217] ? memset+0x31/0x40 [ 2587.680495] ? __nlmsg_put+0x14c/0x1b0 [ 2587.684399] __tipc_add_sock_diag+0x233/0x360 [ 2587.688891] tipc_nl_sk_walk+0x122/0x1d0 [ 2587.692948] ? tipc_sock_diag_handler_dump+0x3d0/0x3d0 [ 2587.698216] tipc_diag_dump+0x24/0x30 [ 2587.702012] netlink_dump+0x519/0xd50 [ 2587.705813] ? netlink_broadcast+0x50/0x50 [ 2587.710054] __netlink_dump_start+0x4f1/0x6f0 [ 2587.714551] ? tipc_data_ready+0x3e0/0x3e0 [ 2587.718782] tipc_sock_diag_handler_dump+0x28e/0x3d0 [ 2587.723883] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 2587.728553] ? tipc_data_ready+0x3e0/0x3e0 [ 2587.732781] ? tipc_unregister_sysctl+0x20/0x20 [ 2587.737442] ? tipc_ioctl+0x3a0/0x3a0 [ 2587.741237] ? netlink_deliver_tap+0x355/0xf80 [ 2587.745818] sock_diag_rcv_msg+0x31d/0x410 [ 2587.750049] netlink_rcv_skb+0x172/0x440 [ 2587.754110] ? sock_diag_bind+0x80/0x80 [ 2587.758081] ? netlink_ack+0xb80/0xb80 [ 2587.761980] sock_diag_rcv+0x2a/0x40 [ 2587.765691] netlink_unicast+0x5a5/0x760 [ 2587.769752] ? netlink_attachskb+0x9a0/0x9a0 [ 2587.774157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.779693] netlink_sendmsg+0xa18/0xfc0 [ 2587.783753] ? netlink_unicast+0x760/0x760 [ 2587.787992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.793530] ? security_socket_sendmsg+0x94/0xc0 [ 2587.798288] ? netlink_unicast+0x760/0x760 [ 2587.802521] sock_sendmsg+0xd5/0x120 [ 2587.806235] ___sys_sendmsg+0x7fd/0x930 [ 2587.810207] ? __local_bh_enable_ip+0x160/0x260 [ 2587.814872] ? copy_msghdr_from_user+0x580/0x580 [ 2587.819629] ? kasan_check_write+0x14/0x20 [ 2587.823858] ? _raw_spin_unlock_bh+0x30/0x40 [ 2587.828268] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2587.833716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2587.839252] ? release_sock+0x1ec/0x2c0 [ 2587.843225] ? __fget_light+0x2e9/0x430 [ 2587.847192] ? fget_raw+0x20/0x20 [ 2587.850640] ? __release_sock+0x3a0/0x3a0 [ 2587.854784] ? tipc_nametbl_build_group+0x273/0x360 [ 2587.859801] ? tipc_setsockopt+0x726/0xd70 [ 2587.864037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2587.869567] ? sockfd_lookup_light+0xc5/0x160 [ 2587.874061] __sys_sendmsg+0x11d/0x280 [ 2587.877956] ? __ia32_sys_shutdown+0x80/0x80 [ 2587.882362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2587.887900] ? fput+0x130/0x1a0 [ 2587.891187] ? __x64_sys_futex+0x47f/0x6a0 [ 2587.895417] ? do_syscall_64+0x9a/0x820 [ 2587.899388] ? do_syscall_64+0x9a/0x820 [ 2587.903367] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2587.908816] __x64_sys_sendmsg+0x78/0xb0 [ 2587.912877] do_syscall_64+0x1b9/0x820 [ 2587.916769] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2587.922130] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2587.927055] ? trace_hardirqs_on_caller+0x310/0x310 [ 2587.932074] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2587.937103] ? recalc_sigpending_tsk+0x180/0x180 [ 2587.941858] ? kasan_check_write+0x14/0x20 [ 2587.946105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2587.950952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2587.956133] RIP: 0033:0x4572d9 [ 2587.959325] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2587.978476] RSP: 002b:00007f4e81d9ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2587.986177] RAX: ffffffffffffffda RBX: 00007f4e81d9f6d4 RCX: 00000000004572d9 [ 2587.993438] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 2588.000698] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.007987] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2588.015247] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000 [ 2588.023588] Kernel Offset: disabled [ 2588.027219] Rebooting in 86400 seconds..