Warning: Permanently added '10.128.0.217' (ECDSA) to the list of known hosts. 2019/11/30 09:41:37 fuzzer started 2019/11/30 09:41:38 dialing manager at 10.128.0.26:35753 2019/11/30 09:41:39 syscalls: 1373 2019/11/30 09:41:39 code coverage: enabled 2019/11/30 09:41:39 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/11/30 09:41:39 extra coverage: extra coverage is not supported by the kernel 2019/11/30 09:41:39 setuid sandbox: enabled 2019/11/30 09:41:39 namespace sandbox: enabled 2019/11/30 09:41:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 09:41:39 fault injection: kernel does not have systematic fault injection support 2019/11/30 09:41:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 09:41:39 net packet injection: enabled 2019/11/30 09:41:39 net device setup: enabled 2019/11/30 09:41:39 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 09:41:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:42:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000002780)=[{&(0x7f0000000140)=""/224, 0xe0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f0000000100)=""/149, 0x95}, {0x0}, {0x0}], 0x3}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r4, 0x0) shutdown(r2, 0x0) 09:42:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={0x0, 0x3aa, &(0x7f0000000140)={&(0x7f0000000000)={0x4c, r1, 0x1, 0x0, 0x0, {0x9}}, 0x4c}}, 0x0) 09:42:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000003c0)=0x17642c4) pwritev(r1, &(0x7f0000001840)=[{&(0x7f0000001640)="10", 0x1}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 09:42:07 executing program 5: r0 = socket$inet6(0xa, 0x800000003, 0xff) r1 = dup(r0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@dev, @mcast2, @loopback, 0x0, 0x0, 0x0, 0x0, 0x2}) 09:42:07 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x2) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0xfffffd95, 0x0, 0x0, 0xffffffffffffff93) splice(r1, 0x0, r0, 0x0, 0x2d000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000788ffc), 0x4) 09:42:07 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$9p(r0, &(0x7f0000001400)="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", 0x8800000) 09:42:08 executing program 5: r0 = eventfd2(0x20000000000007, 0x800) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000000140)=""/231, 0xe7}], 0x2) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000380)=0x5) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x5e) truncate(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x202000) r2 = creat(&(0x7f0000000500)='./bus\x00', 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) inotify_init() fcntl$setstatus(r2, 0x4, 0x6100) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f00000001c0)="0f617900660f10c1c4e1fc2b4a0d6636d9f8c4e1c651daf082a700000000002e36f30f38f65c5bcc803700daba840000000f942a", {0x3}, 0x2, &(0x7f0000000300)="0f15c90f65eb65dc2fc4c185effef20f5c18ddccf0806b1b14c4c3456bae0000008050f2366567d9dc0f1d800d000000"}, &(0x7f0000000400)={0x0, {}, 0x0, &(0x7f0000000600)="f30fbdf4660f382262bdc4c2f902e2c4e27597a2b191911e0fc70c9a65643e646666660fdcad3d690000670ff7d8c4e1edeb499fc4c28139b4f3fe0eef95ffffffff58ec54280032"}, 0x20e, &(0x7f0000000480)) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) connect$inet(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, &(0x7f0000000040), 0x8000fffffffe) socket$inet6(0xa, 0x80004, 0x0) getpgid(0x0) ioctl(0xffffffffffffffff, 0x8911, &(0x7f0000000580)="8ed1a9020136706de4e0f8c1a1a6ef67460516296c7329377a503be1458b0eef886b011f8a63d289d7241e000000000000000000de87ce8147197ebb0a76de09d793b87be78665a6913bcb5b45788a90") sendfile(r2, r5, 0x0, 0xa5cc554) ioctl$KDMKTONE(r3, 0x4b30, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000180)=0xc) sched_getattr(r6, &(0x7f00000003c0)={0x30}, 0x30, 0x0) 09:42:09 executing program 4: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0), 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) fstat(r2, &(0x7f0000000980)) getgroups(0x3ce, 0x0) lseek(r2, 0x0, 0x3) syz_open_dev$loop(0x0, 0x7, 0x0) syzkaller login: [ 58.529977] audit: type=1400 audit(1575106929.160:5): avc: denied { create } for pid=2293 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:42:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000007c0)={0x7, 0x4d, 0x1}, 0x7) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x14b) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = memfd_create(&(0x7f0000001200)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xa8\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x497a) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000040)="244ffb204dfcc0fbbb0cbbda89d6e82bc7c236028b3175dcfe3f06022ef292a9715a09888dc15648bbb8d8cae3081f804012de7c992c185390432200d229d7f0c5b1a8c4263f504a3676bd3ef923382c911d5560a2d0a22016d286bbcf06794056c946187c7192924954a0da8ec57bbaa3f1ade0a7750ce643", 0xfffffffffffffdc4}, {&(0x7f0000000180)="2244fd2aea4cb857e32f69bfa1cfea55e9ef434326ab31c739c3cdcea06066749cf4476690657f027e84d646be879d97d514eae42cf109fb6e55fecc5a9332ffbc23e0204b88869aed64dff3a9d70382d6c027eb6aada802b5ea6641a41ff9c0f735bfcfb078c43bfc726f312cf3d9939f31ef00292e468f99c3db34df", 0x7d}, {&(0x7f00000005c0)="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", 0xfc}], 0x3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r5, 0x104, 0x70bd26, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4040808) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r8 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) llistxattr(&(0x7f0000000480)='./bus\x00', &(0x7f00000006c0)=""/246, 0xf6) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000003c0)={0x1d, 0x3a, 0xc, 0xd, 0x3, 0x4, 0x2, 0x3, 0x1}) connect$inet6(r8, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) signalfd(0xffffffffffffffff, &(0x7f0000000140)={0x11}, 0x245) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x880, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 58.580141] audit: type=1400 audit(1575106929.210:6): avc: denied { write } for pid=2293 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:42:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000001a40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000240)=0x10) splice(r1, &(0x7f0000000400), r4, &(0x7f0000000440)=0xfffffffffffffffc, 0x48, 0x4000000008) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r5 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000480)={'irlan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000500)=r6) r7 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$P9_RREAD(r5, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r7, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) lgetxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="c825674b3ccb44eae9a6af8b02004e75b279bf01f760236893803e44489322e3ed40ffb1a4b2d0000000000000"], &(0x7f0000000300)=""/119, 0x77) ioctl$sock_inet6_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000700)) fsync(r4) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000380)=0x1, 0x4) ioctl$LOOP_SET_CAPACITY(r7, 0x4c07) getpgid(0xffffffffffffffff) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x1a1042, 0x0) ioctl$RTC_WKALM_RD(r8, 0x80287010, &(0x7f0000000600)) open(&(0x7f0000000540)='./file1\x00', 0xa02000, 0x11) lstat(&(0x7f00000006c0)='./bus\x00', &(0x7f0000000740)) lstat(0x0, &(0x7f0000000640)) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4000000000001b9, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x1, 0x2, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r10, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[]}}, 0x0) [ 58.646698] audit: type=1400 audit(1575106929.280:7): avc: denied { read } for pid=2293 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:42:09 executing program 0: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000000100)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0xfffffffffffffeff) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) pread64(r2, 0x0, 0x0, 0xfffffffffffffffd) [ 58.988698] audit: type=1400 audit(1575106929.620:8): avc: denied { create } for pid=2313 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:42:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 09:42:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:09 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) [ 59.460820] [ 59.462498] ====================================================== [ 59.469080] [ INFO: possible circular locking dependency detected ] [ 59.475586] 4.4.174+ #17 Not tainted [ 59.479293] ------------------------------------------------------- [ 59.485697] syz-executor.4/2322 is trying to acquire lock: [ 59.491440] (sel_mutex){+.+.+.}, at: [] sel_read_policy+0x59/0x110 [ 59.500148] [ 59.500148] but task is already holding lock: [ 59.506156] (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 59.515172] [ 59.515172] which lock already depends on the new lock. [ 59.515172] [ 59.523491] [ 59.523491] the existing dependency chain (in reverse order) is: [ 59.531153] -> #4 (sb_writers#4){.+.+.+}: [ 59.536184] [] lock_acquire+0x15e/0x450 [ 59.542480] [] __sb_start_write+0x1af/0x310 [ 59.549122] [] ext4_lazyinit_thread+0x1e4/0x7b0 [ 59.556105] [] kthread+0x273/0x310 [ 59.561966] [] ret_from_fork+0x55/0x80 [ 59.568173] -> #3 (&eli->li_list_mtx){+.+...}: [ 59.573471] [] lock_acquire+0x15e/0x450 [ 59.579766] [] mutex_lock_nested+0xc1/0xb80 [ 59.586457] [] ext4_register_li_request+0x2fd/0x7d0 [ 59.593788] [] ext4_remount+0x1366/0x1b90 [ 59.600867] [] do_remount_sb2+0x41b/0x7a0 [ 59.607939] [] do_mount+0xfdb/0x2a40 [ 59.615873] [] SyS_mount+0x130/0x1d0 [ 59.621900] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 59.629173] -> #2 (&ext4_li_mtx){+.+.+.}: [ 59.634038] [] lock_acquire+0x15e/0x450 [ 59.640404] [] mutex_lock_nested+0xc1/0xb80 [ 59.647034] [] ext4_register_li_request+0x89/0x7d0 [ 59.654368] [] ext4_remount+0x1366/0x1b90 [ 59.660826] [] do_remount_sb2+0x41b/0x7a0 [ 59.667292] [] do_mount+0xfdb/0x2a40 [ 59.673331] [] SyS_mount+0x130/0x1d0 [ 59.679354] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 59.686599] -> #1 (&type->s_umount_key#34){++++++}: [ 59.692444] [] lock_acquire+0x15e/0x450 [ 59.698722] [] down_read+0x42/0x60 [ 59.704571] [] iterate_supers+0xe1/0x250 [ 59.710970] [] selinux_complete_init+0x2f/0x31 [ 59.718043] [] security_load_policy+0x69d/0x9c0 [ 59.725021] [] sel_write_load+0x175/0xf90 [ 59.731478] [] __vfs_write+0x116/0x3d0 [ 59.737857] [] vfs_write+0x182/0x4e0 [ 59.743881] [] SyS_write+0xdc/0x1c0 [ 59.749820] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 59.757062] -> #0 (sel_mutex){+.+.+.}: [ 59.761660] [] __lock_acquire+0x37d6/0x4f50 [ 59.768294] [] lock_acquire+0x15e/0x450 [ 59.774583] [] mutex_lock_nested+0xc1/0xb80 [ 59.781235] [] sel_read_policy+0x59/0x110 [ 59.787687] [] do_loop_readv_writev+0x148/0x1e0 [ 59.795095] [] do_readv_writev+0x573/0x6e0 [ 59.801661] [] vfs_readv+0x7a/0xb0 [ 59.807515] [] default_file_splice_read+0x3ac/0x8b0 [ 59.815015] [] do_splice_to+0xff/0x160 [ 59.821292] [] splice_direct_to_actor+0x249/0x850 [ 59.828443] [] do_splice_direct+0x1a5/0x260 [ 59.835081] [] do_sendfile+0x4ed/0xba0 [ 59.841303] [] compat_SyS_sendfile+0x144/0x160 [ 59.848203] [] do_fast_syscall_32+0x32d/0xa90 [ 59.855036] [] sysenter_flags_fixed+0xd/0x1a [ 59.861760] [ 59.861760] other info that might help us debug this: [ 59.861760] [ 59.869903] Chain exists of: sel_mutex --> &eli->li_list_mtx --> sb_writers#4 [ 59.878589] Possible unsafe locking scenario: [ 59.878589] [ 59.884643] CPU0 CPU1 [ 59.889310] ---- ---- [ 59.894498] lock(sb_writers#4); [ 59.898346] lock(&eli->li_list_mtx); [ 59.905020] lock(sb_writers#4); [ 59.911391] lock(sel_mutex); [ 59.914846] [ 59.914846] *** DEADLOCK *** [ 59.914846] [ 59.920992] 1 lock held by syz-executor.4/2322: [ 59.925653] #0: (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 59.934894] [ 59.934894] stack backtrace: [ 59.939392] CPU: 1 PID: 2322 Comm: syz-executor.4 Not tainted 4.4.174+ #17 [ 59.946399] 0000000000000000 db2f337114d26a41 ffff8801bff9f020 ffffffff81aad1a1 [ 59.954480] ffffffff84057a80 ffff8801bff90000 ffffffff83ab8a20 ffffffff83abc380 09:42:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000001a40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000240)=0x10) splice(r1, &(0x7f0000000400), r4, &(0x7f0000000440)=0xfffffffffffffffc, 0x48, 0x4000000008) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r5 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000480)={'irlan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000500)=r6) r7 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$P9_RREAD(r5, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r7, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) lgetxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="c825674b3ccb44eae9a6af8b02004e75b279bf01f760236893803e44489322e3ed40ffb1a4b2d0000000000000"], &(0x7f0000000300)=""/119, 0x77) ioctl$sock_inet6_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000700)) fsync(r4) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000380)=0x1, 0x4) ioctl$LOOP_SET_CAPACITY(r7, 0x4c07) getpgid(0xffffffffffffffff) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x1a1042, 0x0) ioctl$RTC_WKALM_RD(r8, 0x80287010, &(0x7f0000000600)) open(&(0x7f0000000540)='./file1\x00', 0xa02000, 0x11) lstat(&(0x7f00000006c0)='./bus\x00', &(0x7f0000000740)) lstat(0x0, &(0x7f0000000640)) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r9, &(0x7f00000092c0), 0x4000000000001b9, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x1, 0x2, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r10, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[]}}, 0x0) [ 59.962630] ffffffff83ac8c50 ffff8801bff9f070 ffffffff813abcda ffffffff83e1ef00 [ 59.970736] Call Trace: [ 59.973324] [] dump_stack+0xc1/0x120 [ 59.978693] [] print_circular_bug.cold+0x2f7/0x44e [ 59.985293] [] __lock_acquire+0x37d6/0x4f50 [ 59.991300] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 59.997629] [] ? kasan_kmalloc.part.0+0x62/0xf0 [ 60.004045] [] ? trace_hardirqs_on+0x10/0x10 [ 60.010114] [] ? check_preemption_disabled+0x3c/0x200 [ 60.016966] [] ? check_preemption_disabled+0x3c/0x200 [ 60.023819] [] lock_acquire+0x15e/0x450 [ 60.029460] [] ? sel_read_policy+0x59/0x110 [ 60.035430] [] ? sel_read_policy+0x59/0x110 [ 60.042043] [] mutex_lock_nested+0xc1/0xb80 [ 60.048023] [] ? sel_read_policy+0x59/0x110 [ 60.053989] [] ? kasan_unpoison_shadow+0x35/0x50 [ 60.060396] [] ? fsnotify+0x85c/0x10c0 [ 60.065943] [] ? mutex_trylock+0x500/0x500 [ 60.071847] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 60.080347] [] ? rw_copy_check_uvector+0x221/0x2b0 [ 60.086935] [] ? __fsnotify_inode_delete+0x30/0x30 [ 60.093526] [] sel_read_policy+0x59/0x110 [ 60.099334] [] ? selinux_file_permission+0x2f5/0x450 [ 60.106117] [] do_loop_readv_writev+0x148/0x1e0 [ 60.112571] [] ? security_file_permission+0x91/0x1e0 [ 60.119438] [] ? sel_fill_super+0x6d0/0x6d0 [ 60.125439] [] ? sel_fill_super+0x6d0/0x6d0 [ 60.131424] [] do_readv_writev+0x573/0x6e0 [ 60.137441] [] ? vfs_write+0x4e0/0x4e0 [ 60.142990] [] ? __lock_acquire+0xa4f/0x4f50 [ 60.149063] [] ? __alloc_pages_direct_compact+0x220/0x220 [ 60.156262] [] ? trace_hardirqs_on+0x10/0x10 [ 60.162335] [] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 60.169281] [] vfs_readv+0x7a/0xb0 [ 60.174493] [] default_file_splice_read+0x3ac/0x8b0 [ 60.181188] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 60.188130] [] ? page_cache_pipe_buf_release+0x70/0x70 [ 60.195155] [] ? _raw_spin_unlock_irq+0x28/0x60 [ 60.201490] [] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 60.208363] [] ? _raw_spin_unlock_irq+0x39/0x60 [ 60.214692] [] ? finish_task_switch+0x1e1/0x660 [ 60.221022] [] ? finish_task_switch+0x1b3/0x660 [ 60.227352] [] ? __schedule+0x7a3/0x1ee0 [ 60.234035] [] ? __schedule+0x7af/0x1ee0 [ 60.240106] [] ? __schedule+0x7a3/0x1ee0 [ 60.246030] [] ? __schedule+0x7e3/0x1ee0 [ 60.251946] [] ? fsnotify+0x85c/0x10c0 [ 60.257498] [] ? preempt_schedule_common+0x41/0x70 [ 60.264090] [] ? security_file_permission+0x91/0x1e0 [ 60.268310] audit: type=1400 audit(1575106930.900:9): avc: denied { write } for pid=2364 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 60.295919] [] do_splice_to+0xff/0x160 [ 60.301474] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 60.308335] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 60.315190] [] splice_direct_to_actor+0x249/0x850 [ 60.321865] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 60.328547] [] ? do_splice_to+0x160/0x160 [ 60.334493] [] ? rw_verify_area+0x103/0x2f0 [ 60.340647] [] do_splice_direct+0x1a5/0x260 [ 60.346629] [] ? splice_direct_to_actor+0x850/0x850 [ 60.353425] [] ? rcu_read_lock_sched_held+0x10b/0x130 [ 60.360283] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 60.367133] [] ? __sb_start_write+0x14f/0x310 [ 60.373337] [] do_sendfile+0x4ed/0xba0 [ 60.379245] [] ? __compat_sys_pwritev64+0x170/0x170 [ 60.386449] [] ? compat_SyS_futex+0x1fb/0x2f0 [ 60.392609] [] ? __compat_put_timespec.isra.0+0xce/0x140 [ 60.399720] [] compat_SyS_sendfile+0x144/0x160 [ 60.405964] [] ? SyS_sendfile64+0x150/0x150 09:42:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 60.412129] [] ? do_fast_syscall_32+0xd6/0xa90 [ 60.418400] [] ? SyS_sendfile64+0x150/0x150 [ 60.424402] [] do_fast_syscall_32+0x32d/0xa90 [ 60.430562] [] sysenter_flags_fixed+0xd/0x1a 09:42:11 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x8f7a3a5940065d0a, 0xc8, "1b5f2e5cb8440cf754374a326d627c7e46acf88ddb1c871fdf6ab0debcecf1e79f30af29c9197adb6d2c627004e805b0646149b0078f296d8c42e5dc28a65f1161e02ced238cedacb9dc6a4511eda2cf715fab7d0ef02ff7cb03f640a3155efc02c1a710a086cbdd9a2f37ab09c37c727a67747dbdbfb6d0533ea2377d65f6a36d49f9ccf2293b2dce92509abf2d4070403add80d51601f680d0c8ea8157c969c3d1d431e92c33525e166c2a07f2a5f86bd18d9678d9ceff7f337047d9853b523ea070cc2ffe81b8"}) 09:42:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r3 = dup3(r1, r2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:11 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x8f7a3a5940065d0a, 0xc8, "1b5f2e5cb8440cf754374a326d627c7e46acf88ddb1c871fdf6ab0debcecf1e79f30af29c9197adb6d2c627004e805b0646149b0078f296d8c42e5dc28a65f1161e02ced238cedacb9dc6a4511eda2cf715fab7d0ef02ff7cb03f640a3155efc02c1a710a086cbdd9a2f37ab09c37c727a67747dbdbfb6d0533ea2377d65f6a36d49f9ccf2293b2dce92509abf2d4070403add80d51601f680d0c8ea8157c969c3d1d431e92c33525e166c2a07f2a5f86bd18d9678d9ceff7f337047d9853b523ea070cc2ffe81b8"}) 09:42:11 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r2) creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000500)=0x13) r5 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) ioctl$int_in(r5, 0x5473, &(0x7f0000000340)=0x6) pipe(&(0x7f0000000300)) vmsplice(r4, &(0x7f0000000900)=[{&(0x7f0000000880)="3facf984aaf410097d8616a0a97a43666d2a01872c61633f0a3d2a7c4c474488b0e7419efad7ebbb7ac3dd6149f8ddb165528b4768474c2df637d63796b5f9d5e2211a80d14b1a23b38d3e63f4bc1adfde1b0cfd166e192f8cbb02600bd652d16e1828d6", 0x64}], 0x1, 0xc) r6 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/context\x00', 0x2, 0x0) r7 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r7, &(0x7f0000000100)=ANY=[@ANYBLOB="73797374656d5f753a89626a65010000003a303030303030303030303030303032000000000008000000000000000000"], 0x3f) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r5, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r5) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000400)={0xffff, {{0xa, 0x4e23, 0x0, @local, 0x6}}}, 0x84) getsockname$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x1c) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000040)={0xf, 0x9, 0xff}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 09:42:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r3 = dup3(r1, r2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:11 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x8f7a3a5940065d0a, 0xc8, "1b5f2e5cb8440cf754374a326d627c7e46acf88ddb1c871fdf6ab0debcecf1e79f30af29c9197adb6d2c627004e805b0646149b0078f296d8c42e5dc28a65f1161e02ced238cedacb9dc6a4511eda2cf715fab7d0ef02ff7cb03f640a3155efc02c1a710a086cbdd9a2f37ab09c37c727a67747dbdbfb6d0533ea2377d65f6a36d49f9ccf2293b2dce92509abf2d4070403add80d51601f680d0c8ea8157c969c3d1d431e92c33525e166c2a07f2a5f86bd18d9678d9ceff7f337047d9853b523ea070cc2ffe81b8"}) 09:42:11 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x8f7a3a5940065d0a, 0xc8, "1b5f2e5cb8440cf754374a326d627c7e46acf88ddb1c871fdf6ab0debcecf1e79f30af29c9197adb6d2c627004e805b0646149b0078f296d8c42e5dc28a65f1161e02ced238cedacb9dc6a4511eda2cf715fab7d0ef02ff7cb03f640a3155efc02c1a710a086cbdd9a2f37ab09c37c727a67747dbdbfb6d0533ea2377d65f6a36d49f9ccf2293b2dce92509abf2d4070403add80d51601f680d0c8ea8157c969c3d1d431e92c33525e166c2a07f2a5f86bd18d9678d9ceff7f337047d9853b523ea070cc2ffe81b8"}) 09:42:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r3 = dup3(r1, r2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:12 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:12 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) 09:42:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r3 = dup3(r1, r2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:12 executing program 1: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 09:42:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) dup3(r1, r2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:12 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) socket$nl_xfrm(0x10, 0x3, 0x6) 09:42:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:12 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:13 executing program 4: write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:13 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:13 executing program 4: write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 09:42:13 executing program 1: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:13 executing program 4: write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:13 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:13 executing program 3: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:16 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:16 executing program 3: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 09:42:16 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="9aeb64c9aa554a96c1f9996673dd62925b3fbabd9777c1ddf42bfdd38d30da9e050530f3770838906411789f6d17ec20589c9b7d0d7ccb45b0c971d64b62321d0c95b1408422fc21f4c0a5caf25c302ab21b7004fbbe83c56b62533150af80acd0ad90d61ad800340ae0c4dc81f4047b409d1a226de73143f1289bcdfc681a75d468872bec18580eb08e6b160425859e34a4ce55ff07608856bfd3518cd5575484fa09984cd58245882b6c9c7387d777c7068a35539948fda9176d93b5e3f7e2ea6848641b39272bd96277a1fc47cba13469ee9569f6fa2f028357fa867ab13034f5dbab5b5000f3f318223bfd6c87117144a171a0f74ccb8e7ef7"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:16 executing program 1: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) recvmmsg(r1, &(0x7f0000001240)=[{{&(0x7f0000000bc0)=@ax25={{0x3, @bcast}, [@netrom, @bcast, @netrom, @default, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000e40), 0x7b}, 0x5}, {{&(0x7f0000000e80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)=""/132, 0x416}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001000)=""/76, 0x4c}, 0x5}, {{&(0x7f0000001080)=@can, 0x80, &(0x7f0000001180)=[{&(0x7f00000004c0)=""/128, 0x80}], 0x1, &(0x7f00000011c0)=""/93, 0x5d}, 0x7}], 0x3, 0x1, 0x0) 09:42:16 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:16 executing program 3: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:16 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:16 executing program 4: openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:16 executing program 4: openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:16 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:19 executing program 4: openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000a00)={'system_u:object_r:apt_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x56) 09:42:19 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 09:42:19 executing program 1: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) 09:42:19 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) 09:42:19 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 09:42:19 executing program 3: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:19 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 09:42:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:19 executing program 3: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:19 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, 0x0, 0x0) 09:42:19 executing program 3: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006f40)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@flowinfo={{0x10, 0x29, 0xb, 0x3}}, @flowinfo={{0x10}}], 0x20}}], 0x1, 0x0) 09:42:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 09:42:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:19 executing program 1: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) 09:42:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x660cdbbddf8c80d2) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(r6) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000100000000000000000000400"/44]}) fcntl$getownex(r7, 0x10, &(0x7f00000001c0)={0x0, 0x0}) write$cgroup_pid(r5, &(0x7f0000000240)=r8, 0x12) write(r4, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r10 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r10, 0x4, 0x40400) write$FUSE_WRITE(r10, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r1, 0x4, 0x6100) r11 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) sendmmsg(r11, &(0x7f0000007e00), 0x40000000000025d, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5459, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 09:42:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 09:42:19 executing program 0: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x3, 0x20001003}, 0xc) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1b}}) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x9, 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001cc0)='.\x00\x00\x00u\x00\xbf\x87\xdc\xea\xceB&\xc0\xad5[\xf2\x92\x9e\xc7\r?\t\xbeEl\x9aX\xca\x8f\xa6\xd6Y\x18|\x95\xcc\xcf\xf3\xdc\x9f\x85\xfeQ\xadC,w\x1f\x9a\x8c\xd0\xd7{\xf5q\x1d\xa2y\xd9\x84\xf0\xef\x99\xe1Ew\x02/\x12\xfdBC\x84M\x91\xf2\x1c?\x7f)\xce\x99\x8f\xef,\xb1W\x8b\xc0\xee\x89\xe4@\x05\xa4s\xb9\xb1\xb6x\xd7\xcf\xc5I\xbf\x87\xcd\xa4g\xdc?F\x83ak@\x80N\xe1\x90R\xb9|*p\xc7=\x05\xd8\n|\xa6\x98\"A\xb9jz\xce\xee1P\xd3\\s\x9f_\f\xb9A\x84\xf2\xd8\x83\xd86P\b\xd55;i\xe4f\xc7%\xb8\xce2\xb5Z\t-A\x1f\xa6j^\x1b\xcf\xc1\x1fj\xd9\\\xaa\xa3\xce\x06\x80\x00\x00\x00\x00\x00\x00)}!/\xd2\xacr#;+#YE\xb7\xd3x\f\x97\x85\xe3Oat\xe8TN\xb4C\x98^\x8dJ73[\x8bz3', 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="9aeb64c9aa554a96c1f9996673dd62925b3fbabd9777c1ddf42bfdd38d30da9e050530f3770838906411789f6d17ec20589c9b7d0d7ccb45b0c971d64b62321d0c95b1408422fc21f4c0a5caf25c302ab21b7004fbbe83c56b62533150af80acd0ad90d61ad800340ae0c4dc81f4047b409d1a226de73143f1289bcdfc681a75d468872bec18580eb08e6b160425859e34a4ce55ff07608856bfd3518cd5575484fa09984cd58245882b6c9c7387d777c7068a35539948fda9176d93b5e3f7e2ea6848641b39272bd96277a1fc47cba13469ee9569f6fa2f028357fa867ab13034f5dbab5b5000f3f318223bfd6c87117144a171a0f74ccb8e7ef7"], 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'rose0\x00'}, 0x18) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) io_setup(0x9, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) getgroups(0x0, 0x0) lseek(r3, 0x0, 0x4) 09:42:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 09:42:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40), 0x0, 0x0) 09:42:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) tkill(r1, 0x26) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 09:42:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006f40), 0x0, 0x0) 09:42:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) r3 = add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000180)="2647756b0e6843e2692a0d672563f30aa38c3484b9ddd0de38c967393f41e3d45f06c51764d039e2f2fb2c72e5b9e4ddbdf9d556cfb9274426511481daf9b1db55f87af7e683945bd1f3279d1aec83107af001c9ec92db7773d047611afa8f2786faed6766ec8342dc457e112e7f35836e7461", 0x73, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f0000000780)=""/243, 0xf3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r3, 0xa5, 0x2b}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'tgr128-generic\x00'}}, &(0x7f0000000140)="8dac435da4a2c6c00d5c289f6dbce6e3e5076de469b1730ead253d9da8a360ea12fe4282cc423baea7fd0f5bbe58ca23122c916d027c41f461079f8f7b93958102c9e6e8f20af3f5c86b958b2b05ba65606576a4d48f3a937f95f82bb5c7a0bcece0b9720c56a2a028ac4bef6c7a98de0209bd02fa7d8b4e1591dd20b955644d67527fc6ed0c69282cd84ba299100831bf1e94a275d068fc128887c809ab01f9708c0a47c7", &(0x7f0000000200)=""/43) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, &(0x7f0000000380)) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00)