aab08000a0000000000e293218001c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2083.459695] audit: type=1400 audit(2000001237.250:49410): avc: denied { map } for pid=24780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2083.482080] protocol 88fb is buggy, dev hsr_slave_0 [ 2083.482131] protocol 88fb is buggy, dev hsr_slave_1 [ 2083.482199] protocol 88fb is buggy, dev hsr_slave_0 [ 2083.482248] protocol 88fb is buggy, dev hsr_slave_1 03:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000a1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:53:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x400000000000) [ 2083.631511] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2083.641009] audit: type=1400 audit(2000001237.320:49411): avc: denied { map } for pid=24780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2083.780798] audit: type=1400 audit(2000001237.340:49412): avc: denied { map } for pid=24802 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000040)={0x9, 0x5, 0x6, 0x10001}, 0x10) 03:53:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x34}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:53:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e29321e001c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000e1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:53:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000100)=0x200000, 0x8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000001740)=0x100000001, 0x4) clock_gettime(0x0, &(0x7f00000016c0)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000001640)=[{{&(0x7f0000000180)=@pppol2tp, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/71, 0x47}], 0x1}, 0x100000001}, {{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000001500)=[{&(0x7f0000000380)=""/169, 0xa9}, {&(0x7f0000000440)=""/185, 0xb9}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x3, &(0x7f0000001540)=""/225, 0xe1}, 0x7ff}], 0x2, 0x10040, &(0x7f0000001700)={r4, r5+10000000}) connect$inet6(r2, &(0x7f0000000140), 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r6, &(0x7f0000000000)=0x100000, 0xfffc) [ 2083.932110] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2083.950455] protocol 88fb is buggy, dev hsr_slave_0 [ 2083.955579] protocol 88fb is buggy, dev hsr_slave_1 03:53:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x60ffffffffff) [ 2084.009281] audit: type=1400 audit(2000001237.340:49413): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e29321fc01c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2084.086523] audit: type=1400 audit(2000001237.360:49414): avc: denied { map } for pid=24802 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:53:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800c00e1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2084.117897] audit: type=1400 audit(2000001237.360:49415): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x3d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2084.190449] protocol 88fb is buggy, dev hsr_slave_0 [ 2084.190487] protocol 88fb is buggy, dev hsr_slave_1 03:53:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x740000000000) [ 2084.287521] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2084.305642] audit: type=1400 audit(2000001237.360:49416): avc: denied { map } for pid=24802 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000f1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2084.470757] audit: type=1400 audit(2000001237.370:49417): avc: denied { map } for pid=24832 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2084.594263] audit: type=1400 audit(2000001237.480:49418): avc: denied { map } for pid=24925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2088.110508] net_ratelimit: 19 callbacks suppressed [ 2088.115510] protocol 88fb is buggy, dev hsr_slave_0 [ 2088.120579] protocol 88fb is buggy, dev hsr_slave_1 [ 2088.350493] protocol 88fb is buggy, dev hsr_slave_0 [ 2088.350497] protocol 88fb is buggy, dev hsr_slave_0 [ 2088.350551] protocol 88fb is buggy, dev hsr_slave_1 [ 2088.355640] protocol 88fb is buggy, dev hsr_slave_1 [ 2089.150573] protocol 88fb is buggy, dev hsr_slave_0 [ 2089.155735] protocol 88fb is buggy, dev hsr_slave_1 [ 2089.710514] protocol 88fb is buggy, dev hsr_slave_0 [ 2089.715608] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.310553] net_ratelimit: 20 callbacks suppressed [ 2093.310559] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.322898] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.870526] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.875689] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.882233] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.887291] protocol 88fb is buggy, dev hsr_slave_1 03:54:07 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210003c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x7fffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:54:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x66}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800291b1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:07 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7fffffffefff) 03:54:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x80) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0x5b, 0x0, 0x10001, 0x100}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000180)={0x5, r1, 0x10000, 0xfff}) ioctl(r0, 0x9, &(0x7f00000001c0)="0adc1f123c123f319bd070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0xfff, 0x0, 0x0, 0x1, 0x844c, 0x80000001, 0x3, 0x3b, 0x0, 0x3, 0xab43, 0x40, 0x238, 0x3, 0x2, 0x4}}) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="00276f9df71d907d6c67e7eaba8149561bceec2cb13a48b2aca42688c16340a4a40000000000de099e8eea0000000000", @ANYRES16=r4, @ANYBLOB="080825bd7000fcdbdf2501000000080005008100000008000500090000000800050009000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x400c094) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x35}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={r4, 0xfffffffffffffbff, 0x6, 0xffffffff, 0x80, 0x4}, 0x14) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e29321000fc000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48001b291400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2094.212809] kauditd_printk_skb: 47 callbacks suppressed [ 2094.212823] audit: type=1400 audit(2000001248.010:49466): avc: denied { map } for pid=25270 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x940000000000) [ 2094.350469] protocol 88fb is buggy, dev hsr_slave_0 [ 2094.355607] protocol 88fb is buggy, dev hsr_slave_1 [ 2094.379055] audit: type=1400 audit(2000001248.110:49467): avc: denied { map } for pid=25371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0xc7}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210017c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x220080, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x8e50, 0x101000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x4400, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x48000, 0x0) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x581040, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = msgget$private(0x0, 0x80) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x7, r5, r6, r7, r8, 0x11, 0xab01}, 0xa2c, 0x3f, 0x7f, 0x3, 0x80, 0x8, r2, r2}) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r9, 0x401845c0, &(0x7f0000000500)={0x100000000, 0x1, 0x3f, 0x9, 0x5, 0x80000001}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$UI_SET_RELBIT(r10, 0x40045566, 0x4) sendfile(r3, r10, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x7, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000040)=""/62, &(0x7f0000000100)=0x3e) write$vhci(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="04408c7ef88a6b166108404b7b6100bb0b33a7d4dccf3227c3d8c92948350b3aff7b74847d85e2925560e4eb5c96284dc29981dae41d6039f3e032aced8c28aa50b9f893ba8a7353ab0eb9e910635811091c864c8623fcb27ee21795a16e9a2656844e866c5cef65d744f2274e0d0e9320a88f8f00000000"], 0xf) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x4) read$rfkill(r2, &(0x7f0000000080), 0x8) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000140)=0xfffffffffffff10a, 0x4) [ 2094.502502] audit: type=1400 audit(2000001248.120:49468): avc: denied { map } for pid=25371 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480003471400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x50710000000000) [ 2094.590454] protocol 88fb is buggy, dev hsr_slave_0 [ 2094.590461] protocol 88fb is buggy, dev hsr_slave_0 [ 2094.664883] audit: type=1400 audit(2000001248.130:49469): avc: denied { map } for pid=25371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2094.743819] audit: type=1400 audit(2000001248.130:49470): avc: denied { map } for pid=25388 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2094.766844] audit: type=1400 audit(2000001248.150:49472): avc: denied { map } for pid=25371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000601400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210020c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2094.796059] audit: type=1400 audit(2000001248.140:49471): avc: denied { map } for pid=25388 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xc0700000000000) [ 2094.891503] audit: type=1400 audit(2000001248.150:49473): avc: denied { map } for pid=25388 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000040), 0x8) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000200)={0x940f, 0x100}) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000080)=0x60) 03:54:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000ec01400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210223c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:08 executing program 3: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mq_notify(r0, &(0x7f0000000280)={0x0, 0x40, 0x7, @thr={&(0x7f0000000300)="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", &(0x7f0000000240)="10af429eac770b02"}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000002c0)=0x100000001, 0x4bb8e76558661299) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x3}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000100)=""/244) sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) [ 2095.105443] audit: type=1400 audit(2000001248.250:49474): avc: denied { map } for pid=25462 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2095.218277] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. 03:54:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xd0500000000000) 03:54:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000e01400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2095.251381] audit: type=1400 audit(2000001248.270:49475): avc: denied { map } for pid=25462 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x7ffff000}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x9, 0x4, 0x94, 0x0, 0x8, 0x0, 0xb, 0x28d023bd, 0xfffffffffffffffa, 0x9, 0x4, 0x8, 0x600000000000, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x8ab800000000000, 0x2, 0xd8bf, 0x4, 0x3, 0xfffffffffffffff7, 0x1, 0x8, 0x8, 0x400, 0x389, 0x7, 0x5, 0xaca, 0x5, 0x6, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x20000, 0x8, 0xbb2, 0x2, 0x100000001, 0xfffffffffffffffa, 0x5}, r2, 0xffffffffffffffff, r3, 0xa) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140), 0x1c) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r5, r6) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r7, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:09 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210035c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r3, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f00000008c0)}}], 0x1, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() lchown(&(0x7f00000001c0)='./file0\x00', r4, r5) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) socketpair(0x9, 0x803, 0x7ff, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r7, 0x400443c9, &(0x7f0000000180)={{0x5, 0x80000001, 0x1, 0x7, 0x2, 0x7}, 0x80000000}) connect$inet6(r6, &(0x7f0000000140), 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r8, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x100000000000000) 03:54:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000f01400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2098.510524] net_ratelimit: 20 callbacks suppressed [ 2098.510532] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.520626] protocol 88fb is buggy, dev hsr_slave_1 [ 2098.750508] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.750514] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.750604] protocol 88fb is buggy, dev hsr_slave_1 [ 2098.755630] protocol 88fb is buggy, dev hsr_slave_1 [ 2099.550621] protocol 88fb is buggy, dev hsr_slave_0 [ 2099.555780] protocol 88fb is buggy, dev hsr_slave_1 [ 2100.110519] protocol 88fb is buggy, dev hsr_slave_0 [ 2100.115607] protocol 88fb is buggy, dev hsr_slave_1 [ 2103.711014] net_ratelimit: 20 callbacks suppressed [ 2103.716026] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.721137] protocol 88fb is buggy, dev hsr_slave_1 [ 2104.270521] protocol 88fb is buggy, dev hsr_slave_0 [ 2104.275604] protocol 88fb is buggy, dev hsr_slave_1 [ 2104.280753] protocol 88fb is buggy, dev hsr_slave_0 [ 2104.285773] protocol 88fb is buggy, dev hsr_slave_1 [ 2104.750516] protocol 88fb is buggy, dev hsr_slave_0 [ 2104.755661] protocol 88fb is buggy, dev hsr_slave_1 [ 2104.990465] protocol 88fb is buggy, dev hsr_slave_0 [ 2104.990470] protocol 88fb is buggy, dev hsr_slave_0 03:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x1, [0x1]}, &(0x7f0000000100)=0x6) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:54:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210040c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000fff1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xc7}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x8000000000000000) 03:54:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000100)={0x8001, 0x0, 0x3ca, 0x3}) connect$inet6(r2, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r4, &(0x7f0000000000)=0x100000, 0xfffc) [ 2105.689416] kauditd_printk_skb: 76 callbacks suppressed [ 2105.689430] audit: type=1400 audit(2000001259.480:49552): avc: denied { map } for pid=26192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e2932100020000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2105.740492] audit: type=1400 audit(2000001259.520:49553): avc: denied { map } for pid=26192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000000f00190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x441) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'system.', '-system\x00'}, &(0x7f0000000240)=""/4096, 0x1000) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xfeffffff00000000) [ 2105.849251] audit: type=1400 audit(2000001259.640:49554): avc: denied { map } for pid=26272 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x2000091b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001200190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2105.968713] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pig=26308 comm=syz-executor.0 [ 2105.980501] audit: type=1400 audit(2000001259.640:49555): avc: denied { map } for pid=26273 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.107386] audit: type=1400 audit(2000001259.760:49556): avc: denied { map } for pid=26307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.179876] audit: type=1400 audit(2000001259.760:49557): avc: denied { map } for pid=26307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.275926] audit: type=1400 audit(2000001259.810:49558): avc: denied { map } for pid=26309 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.317444] audit: type=1400 audit(2000001259.900:49559): avc: denied { map } for pid=26317 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.341300] audit: type=1400 audit(2000001259.900:49560): avc: denied { map } for pid=26317 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2106.365409] audit: type=1400 audit(2000001259.900:49561): avc: denied { map } for pid=26317 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.910500] net_ratelimit: 20 callbacks suppressed [ 2108.910508] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.920610] protocol 88fb is buggy, dev hsr_slave_1 [ 2109.150510] protocol 88fb is buggy, dev hsr_slave_0 [ 2109.150515] protocol 88fb is buggy, dev hsr_slave_0 [ 2109.150574] protocol 88fb is buggy, dev hsr_slave_1 [ 2109.155677] protocol 88fb is buggy, dev hsr_slave_1 [ 2109.950562] protocol 88fb is buggy, dev hsr_slave_0 [ 2109.955678] protocol 88fb is buggy, dev hsr_slave_1 [ 2110.510530] protocol 88fb is buggy, dev hsr_slave_0 [ 2110.515645] protocol 88fb is buggy, dev hsr_slave_1 [ 2114.110536] net_ratelimit: 20 callbacks suppressed [ 2114.110542] protocol 88fb is buggy, dev hsr_slave_0 [ 2114.120648] protocol 88fb is buggy, dev hsr_slave_1 [ 2114.670484] protocol 88fb is buggy, dev hsr_slave_0 [ 2114.675626] protocol 88fb is buggy, dev hsr_slave_1 [ 2114.680732] protocol 88fb is buggy, dev hsr_slave_0 [ 2114.685750] protocol 88fb is buggy, dev hsr_slave_1 [ 2115.150523] protocol 88fb is buggy, dev hsr_slave_0 [ 2115.155669] protocol 88fb is buggy, dev hsr_slave_1 [ 2115.390483] protocol 88fb is buggy, dev hsr_slave_0 [ 2115.390488] protocol 88fb is buggy, dev hsr_slave_0 03:54:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100)=0xff, 0x4) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000180), 0x8) 03:54:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210002c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x1d1, 0x20000801, &(0x7f0000000040)={0xa, 0x2, 0x0, @dev={0xfe, 0x80, [], 0xd}, 0xad}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x0, &(0x7f00000000c0)=0x802) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x5}, 0x10) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x774, 0x4) 03:54:29 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffefffffff7f0000) 03:54:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001300190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x7fffefd6}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210003c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2115.949437] kauditd_printk_skb: 13 callbacks suppressed [ 2115.949451] audit: type=1400 audit(2000001269.740:49575): avc: denied { map } for pid=26432 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x40) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000280)={0x1c, 0x6, 0x9}) socketpair(0xa, 0x1, 0x8, &(0x7f00000003c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)={0x2, [0x3, 0x5]}, 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x0, &(0x7f00000001c0)=0xee, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140), 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0xfffc) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4f0c695e71fe3c4c}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r6, 0x7}}, 0x10) 03:54:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000021400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:29 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffffffff00000000) 03:54:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x200008b2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2116.095705] audit: type=1400 audit(2000001269.750:49576): avc: denied { map } for pid=26432 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210004c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2116.245381] audit: type=1400 audit(2000001269.870:49577): avc: denied { map } for pid=26518 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.405779] audit: type=1400 audit(2000001269.890:49578): avc: denied { map } for pid=26518 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.479724] audit: type=1400 audit(2000001269.980:49579): avc: denied { map } for pid=26548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.503700] audit: type=1400 audit(2000001269.980:49580): avc: denied { map } for pid=26548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.594773] audit: type=1400 audit(2000001270.000:49581): avc: denied { map } for pid=26548 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.623692] audit: type=1400 audit(2000001270.010:49582): avc: denied { map } for pid=26548 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.649365] audit: type=1400 audit(2000001270.010:49583): avc: denied { map } for pid=26550 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.672135] audit: type=1400 audit(2000001270.030:49584): avc: denied { map } for pid=26548 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2119.310496] net_ratelimit: 20 callbacks suppressed [ 2119.315518] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.320607] protocol 88fb is buggy, dev hsr_slave_1 [ 2119.550547] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.550552] protocol 88fb is buggy, dev hsr_slave_0 [ 2119.550621] protocol 88fb is buggy, dev hsr_slave_1 [ 2119.555689] protocol 88fb is buggy, dev hsr_slave_1 [ 2120.350546] protocol 88fb is buggy, dev hsr_slave_0 [ 2120.355644] protocol 88fb is buggy, dev hsr_slave_1 [ 2120.910510] protocol 88fb is buggy, dev hsr_slave_0 [ 2120.915612] protocol 88fb is buggy, dev hsr_slave_1 [ 2124.510514] net_ratelimit: 19 callbacks suppressed [ 2124.515504] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.520613] protocol 88fb is buggy, dev hsr_slave_1 [ 2125.070519] protocol 88fb is buggy, dev hsr_slave_0 [ 2125.075611] protocol 88fb is buggy, dev hsr_slave_1 [ 2125.080738] protocol 88fb is buggy, dev hsr_slave_0 [ 2125.085793] protocol 88fb is buggy, dev hsr_slave_1 [ 2125.550555] protocol 88fb is buggy, dev hsr_slave_0 [ 2125.555741] protocol 88fb is buggy, dev hsr_slave_1 [ 2125.790490] protocol 88fb is buggy, dev hsr_slave_0 [ 2125.790496] protocol 88fb is buggy, dev hsr_slave_0 03:54:39 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffffffffff600000) 03:54:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x2) getpeername$unix(r1, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl(r2, 0x200, &(0x7f0000000100)="654e461a49c57b23376c1272f8553e7e6d376960574d60b8fbfd84ab6e25a579f81bb2aa222a2528665f4d72d8ecfc02bfc92fdad00861274ef224807a148161f4effb41b6ae8cdf3d0229bea7937fe8ce0a6d2cf9258004b5f5bf0ffe7ea7c0f4a395ee911e7c5b7332818a2085f3be492c4a139b2aa84ddc1815ab7ffa1fc47ac44c8220682713393998b1e7a5003fb35c0755c603c980faac7c7180541d40d5ad2911c464005806c17d34006824d71dfcc3877a698af79374fcab8757d908d8aff02bccc6cd9b22b586fa24ccfbb3a30e24695c8530d714956c5be1fe9dc1da4e2df6fb") vmsplice(r2, &(0x7f0000000300)=[{&(0x7f0000000040)}, {&(0x7f0000000200)="bc5902e8e2a7c759cb338057d121eb0853d1294b1ff00a3227b49af439ae55fb0aa03178f8916b83c154e07577b4dbb84e63cc1ff13a0c01a8d9141d57ed1332ca", 0x41}, {&(0x7f0000000280)="2154f542d123097a1bebe503b035041e254c73222d5354480bb9048f77b627720dae3b2c75123d2fef58888f4ecdc74e7799f31cdee0b3d5d542db1d4627ab2c2a1545aaf8466a57e93423fe82ba56f99f6232a3f7d2435cdce2248f024d6abd881f1e43956617", 0x67}], 0x3, 0x8) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:54:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000041400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr, 0x400000000}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:39 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e29321000fc000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x7fffef7b}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 03:54:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000a1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r3, &(0x7f0000000180), 0xe9a3) sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) clock_settime(0x1, &(0x7f0000000100)) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f00000000c0)=0xc63) [ 2126.190162] kauditd_printk_skb: 22 callbacks suppressed [ 2126.190176] audit: type=1400 audit(2000001279.980:49607): avc: denied { map } for pid=26685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210017c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2126.318149] audit: type=1400 audit(2000001280.030:49608): avc: denied { map } for pid=26685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:40 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) tkill(r0, 0xf) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000e1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @empty}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) [ 2126.483329] audit: type=1400 audit(2000001280.030:49609): avc: denied { map } for pid=26685 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x4f3}], 0xc7, 0x0) [ 2126.627222] audit: type=1400 audit(2000001280.070:49610): avc: denied { map } for pid=26685 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.734525] audit: type=1400 audit(2000001280.110:49611): avc: denied { map } for pid=26727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.814177] audit: type=1400 audit(2000001280.220:49612): avc: denied { map } for pid=26790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.858725] audit: type=1400 audit(2000001280.240:49613): avc: denied { map } for pid=26828 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.886578] audit: type=1400 audit(2000001280.240:49614): avc: denied { map } for pid=26828 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.910534] audit: type=1400 audit(2000001280.250:49615): avc: denied { map } for pid=26828 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2126.935656] audit: type=1400 audit(2000001280.260:49616): avc: denied { map } for pid=26828 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2129.710506] net_ratelimit: 20 callbacks suppressed [ 2129.715510] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.720616] protocol 88fb is buggy, dev hsr_slave_1 [ 2129.950517] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.950522] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.950578] protocol 88fb is buggy, dev hsr_slave_1 [ 2129.955649] protocol 88fb is buggy, dev hsr_slave_1 [ 2130.750541] protocol 88fb is buggy, dev hsr_slave_0 [ 2130.755630] protocol 88fb is buggy, dev hsr_slave_1 [ 2131.310496] protocol 88fb is buggy, dev hsr_slave_0 [ 2131.315825] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.910570] net_ratelimit: 20 callbacks suppressed [ 2134.915684] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.920802] protocol 88fb is buggy, dev hsr_slave_1 [ 2135.470515] protocol 88fb is buggy, dev hsr_slave_0 [ 2135.475706] protocol 88fb is buggy, dev hsr_slave_1 [ 2135.480859] protocol 88fb is buggy, dev hsr_slave_0 [ 2135.485927] protocol 88fb is buggy, dev hsr_slave_1 [ 2135.950555] protocol 88fb is buggy, dev hsr_slave_0 [ 2135.955709] protocol 88fb is buggy, dev hsr_slave_1 [ 2136.190516] protocol 88fb is buggy, dev hsr_slave_0 [ 2136.190558] protocol 88fb is buggy, dev hsr_slave_1 03:54:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x245) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0xfffffffffffffffe, r1) ioctl$UI_DEV_CREATE(r2, 0x5501) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000180)={r3}) r4 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r4, 0xb) 03:54:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xbcb7, 0x20000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) 03:54:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000f1400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:50 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210035c000000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:54:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc2d}], 0xc7, 0x0) 03:54:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f00000000c0)=0x100000001, 0xffffffffffffff97) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:54:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000601400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:54:50 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e2932100012400000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2136.464938] kauditd_printk_skb: 17 callbacks suppressed [ 2136.464951] audit: type=1400 audit(2000001290.260:49634): avc: denied { map } for pid=27033 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x4000004001, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc3d}], 0xc7, 0x0) 03:54:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000e01400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2136.598252] audit: type=1400 audit(2000001290.390:49635): avc: denied { map } for pid=27200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xa, r0, 0x0, 0x1) [ 2136.726056] audit: type=1400 audit(2000001290.420:49636): avc: denied { map } for pid=27200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2136.876200] audit: type=1400 audit(2000001290.430:49637): avc: denied { map } for pid=27200 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2136.976963] audit: type=1400 audit(2000001290.440:49638): avc: denied { map } for pid=27200 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.004490] audit: type=1400 audit(2000001290.440:49639): avc: denied { map } for pid=27200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.043022] audit: type=1400 audit(2000001290.440:49640): avc: denied { map } for pid=27202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.067529] audit: type=1400 audit(2000001290.440:49641): avc: denied { map } for pid=27202 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.089829] audit: type=1400 audit(2000001290.450:49642): avc: denied { map } for pid=27200 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.115249] audit: type=1400 audit(2000001290.450:49643): avc: denied { map } for pid=27200 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2140.110526] net_ratelimit: 19 callbacks suppressed [ 2140.110534] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.120635] protocol 88fb is buggy, dev hsr_slave_1 [ 2140.350512] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.350516] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.350576] protocol 88fb is buggy, dev hsr_slave_1 [ 2140.355650] protocol 88fb is buggy, dev hsr_slave_1 [ 2141.150557] protocol 88fb is buggy, dev hsr_slave_0 [ 2141.155654] protocol 88fb is buggy, dev hsr_slave_1 [ 2141.710539] protocol 88fb is buggy, dev hsr_slave_0 [ 2141.715643] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.310577] net_ratelimit: 20 callbacks suppressed [ 2145.310584] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.320675] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.870551] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.877234] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.882337] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.887373] protocol 88fb is buggy, dev hsr_slave_1 [ 2146.350520] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.355644] protocol 88fb is buggy, dev hsr_slave_1 03:55:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhci\x00', 0x101800) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) syz_init_net_socket$ax25(0x3, 0x5, 0xf0) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000280)=0xffffffffffffffd5) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) 03:55:00 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e2932100018001000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:00 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) r2 = dup(r1) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) dup(r2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfcc7}], 0xc7, 0x0) [ 2146.590527] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.590531] protocol 88fb is buggy, dev hsr_slave_0 03:55:00 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c002000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:00 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000140)="1796b32b7395dc8b6f94cf57a2d42bd54ce444c0daeb38ea93ca97f7edaf0609ecda0cbfaf2f235e24fb21a9a30836c70128f2e7f22955dbd4271a2319b7948af254440937bf3b97dfdcca3b40a8d278df58636c6b46a3843006fa838fe6ecdb3beace0dcae439ccf783f57675b4ce4fd6854a6092625c8eb38b41b89b8f957c1fbe46f3cc8c2f4fd9f909984fb46b7062444bb41557427cb9a758351cd5f0b2bf7e95b5e9cc0b45b4b45d5f45b29954827b04b3d1f4aba1132c3b7659905d") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:55:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000002000190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2146.694871] kauditd_printk_skb: 21 callbacks suppressed [ 2146.694896] audit: type=1400 audit(2000001300.490:49665): avc: denied { map } for pid=27368 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2146.839830] audit: type=1400 audit(2000001300.620:49666): avc: denied { map } for pid=27536 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2146.847780] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=32 sclass=netlink_tcpdiag_socket pig=27557 comm=syz-executor.0 03:55:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x20010fb6}], 0xc7, 0x0) 03:55:00 executing program 2: clone(0x7ffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)="019f450125a91e589032b79e0100000000000000704cbe23b29734957b699dd66dde0a5c912ef74b8be95d3cf638a374a923c5a38f5c3c6d02633fcb336cc1e526e3efe7dc1b4c7b26970fe92d37c92802d455dd08fdd88d07a4419abc0cba3c6a3b2e36317c447e94148ab3df1d6db25c35a524658983e21f70d5c7009229beb987edbd9a") ptrace$cont(0x7, r0, 0x0, 0x0) getpgrp(r0) 03:55:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x2, 0x2) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@remote={[], 0x1}, 0x6, 'bridge0\x00'}) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$vhci(0xffffffffffffffff, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) read$rfkill(r1, &(0x7f0000000080), 0x8) [ 2146.981304] audit: type=1400 audit(2000001300.620:49667): avc: denied { map } for pid=27536 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:00 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c003000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000022300190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2147.167347] audit: type=1400 audit(2000001300.680:49668): avc: denied { map } for pid=27535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.215026] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=35 sclass=netlink_tcpdiag_socket pig=27731 comm=syz-executor.0 03:55:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c004000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2147.269155] audit: type=1400 audit(2000001300.680:49669): avc: denied { map } for pid=27535 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001800810fe00f80ecdb4cb904014865160b0003000b000000000009000e00da1b40d819a9060015000504", 0x2e}], 0x1}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001640)) fstat(r0, &(0x7f0000001680)) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) sendmsg$unix(r1, &(0x7f0000001840)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000180)="a0a95f5e110796e93f357ab95ca7a66a7a62a76c680620fa296e5a5ebbb772f9b335952f25c9ec79746a895e6129389df7a00d6ae6a7d5e51910c08ea42d64106d4550772b4e7f69cb12b2776deedd83bfaecd7eb7af40ad0e76af0663a288db49b8508920e3271acc5089c6ce8c59c15c6bfff44c1368bc8707e76772aaf45353932937f9cb15a84e9545d364b6322a8516bdedba2befd2c8ed3ca4075833ccf8a223096796b25e42b85c28af699360dcacd8a2f2a016c9f8a6576975c5462e06ecc771340604d9649e0488903c47d1487f984c3f34c0cf454e6a4c36e3ae90c6dbba0d1d95f76ce1168371443c2be6074f2cb8cf9b580b", 0xf8}, {&(0x7f0000000280)="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", 0xfa}, {&(0x7f0000000080)}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="ac9e8802a44cd5fa861f4def2a97fb9878ed207ee9314d47cdf1c965a4ba5938b4640970c57d605be63a02e5e385abff208d8208890e82965e3e4273720b3b8de3cfc1e9f52edb0cf8bc36372e2a4ffb53f4d0c27f69c9f37dcf94ec9689c7f00ce60513524c0a0cfa5ac0b9e1e7d3444aa24c03cb9b8bf471f95641bef23e2fb688d6917fc1234d57c9d416286e5c92da42a9e1055a9c813cfb04", 0xfffffffffffffcd0}, {&(0x7f0000001480)="4b36133115df5f963cfa46974fc99bb99f7ba8342766484e50571225c8682944edca113693152dea409729a4d156c0c6e29d63c773871758", 0x38}, {&(0x7f00000014c0)="f290f52339233eb9c259d566f8d7d2fa6c5cb2f3325418f3c0423eb362ad8577d89f", 0x22}, {&(0x7f0000001500)="607fcf21c5b90eab52f73dfa8383e2185be5fe8a336983428567946a62869b02515b68123f7773d764be549b2d7ddc84297d8f37af505b999babd4f417cc11ce23831d7d461ea479d4a890c8163b66638b3da52aac69e75a6430e501bc1063f0f1549ad8d5fc44bde014997851bc19917cc5f4a599d542adb3a6991b230b3db85443b387dc33616f0540196cec0ddd1975d077596b12f9887c506802bc65acb904ec5daa750e31877945d3ff607d3de5d9b8", 0xb2}], 0x8, &(0x7f0000001900), 0x78, 0x4080}, 0x0) fstat(r0, &(0x7f0000001880)) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000380), 0x8) [ 2147.379350] audit: type=1400 audit(2000001300.680:49670): avc: denied { map } for pid=27535 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x7fffee89}], 0xc7, 0x0) 03:55:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000ec000190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2147.422007] audit: type=1400 audit(2000001300.730:49671): avc: denied { map } for pid=27659 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x20000, 0x0) sendto$packet(r2, &(0x7f0000000340), 0x0, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c005000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2147.532375] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2147.575934] audit: type=1400 audit(2000001300.860:49672): avc: denied { map } for pid=27686 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.618277] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=192 sclass=netlink_tcpdiag_socket pig=28023 comm=syz-executor.0 03:55:01 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7f, 0x40000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x4000000, 0x20, 0x20000000, 0x6}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x7, 0x0) 03:55:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000fff00190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2147.734431] audit: type=1400 audit(2000001300.880:49673): avc: denied { map } for pid=27686 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2, 0x0) 03:55:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c006000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2147.878347] audit: type=1400 audit(2000001300.880:49674): avc: denied { map } for pid=27686 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.937505] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=255 sclass=netlink_tcpdiag_socket pig=28254 comm=syz-executor.0 03:55:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000000f00190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:01 executing program 2: clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r0, 0x0, 0x41) tkill(r0, 0x38) prctl$PR_GET_TIMERSLACK(0x1e) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xc0c00, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x100000001, 0x61c6, 0x7ff}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) write$apparmor_current(r1, &(0x7f00000002c0)=@profile={'permprofile ', '/dev/mixer\x00'}, 0x17) lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'osx.', '\x00'}) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000300)={@initdev, 0x0}, &(0x7f0000000340)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'caif0\x00', r2}) accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x800) getpeername$inet6(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) sched_setscheduler(r0, 0x7, &(0x7f0000000140)=0x1) ioctl$RTC_PIE_ON(r1, 0x7005) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c008000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2148.182047] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pig=28427 comm=syz-executor.0 [ 2150.510503] net_ratelimit: 20 callbacks suppressed [ 2150.510511] protocol 88fb is buggy, dev hsr_slave_0 [ 2150.520602] protocol 88fb is buggy, dev hsr_slave_1 [ 2150.750503] protocol 88fb is buggy, dev hsr_slave_0 [ 2150.750563] protocol 88fb is buggy, dev hsr_slave_1 [ 2150.755630] protocol 88fb is buggy, dev hsr_slave_1 [ 2151.550629] protocol 88fb is buggy, dev hsr_slave_0 [ 2151.555745] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.110496] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.115624] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.120740] protocol 88fb is buggy, dev hsr_slave_0 [ 2155.710573] net_ratelimit: 19 callbacks suppressed [ 2155.715581] protocol 88fb is buggy, dev hsr_slave_0 [ 2155.720854] protocol 88fb is buggy, dev hsr_slave_1 [ 2156.270477] protocol 88fb is buggy, dev hsr_slave_0 [ 2156.275613] protocol 88fb is buggy, dev hsr_slave_1 [ 2156.280734] protocol 88fb is buggy, dev hsr_slave_0 [ 2156.285789] protocol 88fb is buggy, dev hsr_slave_1 [ 2156.750559] protocol 88fb is buggy, dev hsr_slave_0 [ 2156.755813] protocol 88fb is buggy, dev hsr_slave_1 [ 2156.990487] protocol 88fb is buggy, dev hsr_slave_0 [ 2156.990492] protocol 88fb is buggy, dev hsr_slave_0 03:55:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) socket$alg(0x26, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000100), 0x8) 03:55:11 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x92e, 0x0, 0xfffffffffffffff9, 0x1ff, 0xa8, r0}) ptrace$setregs(0xd, r0, 0x9, &(0x7f0000000140)="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") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:11 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c009000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3, 0x0) 03:55:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001200190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001300190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x20000) write$apparmor_current(r0, &(0x7f0000000040)=@hat={'changehat ', 0x2, 0x5e, ['vmnet1\x00', '\x00', 'mime_type^\x00', 'GPLkeyring\x00', '\x00', 'cpusetproc\x00']}, 0x47) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x44}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r2, 0xe, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb325}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf1b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x74a}]}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x90) ptrace$cont(0x7, r1, 0x0, 0x0) 03:55:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00a000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2158.195945] kauditd_printk_skb: 52 callbacks suppressed [ 2158.195958] audit: type=1400 audit(2000001311.990:49727): avc: denied { map } for pid=28481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x14200, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x124, r3, 0xe00, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2e48}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x611}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f49}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x476cf617}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000100)={0xfff, 0x7, 0xa7fe}) getpid() setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x400, {{0x2, 0x4e24, @local}}}, 0x88) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x84, &(0x7f00000004c0)=[@in6={0xa, 0x4e24, 0x101, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ff}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e21, 0x7f, @rand_addr="b6b3d7ce3a27a5c1b5e0d51a21f0c082", 0x9}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0x7fe00000000000, @empty, 0x8}]}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000600)={r5, 0xd5, "37d81d27b7c4679de50c9273d9f7dd1bd6c558e693a97ffcff4d81c9198af88304a99b24c3623e797c47a1c701fd9f68ec761b0a2372f56411acf2b1e3c8af33d5be703e9884a34dd7ee83b560aefe42483c7fbdb3a18a6f84c9e529087d658890450c76907f4c96909002e5dd55185064e1fcde5d694edbdbe3ae2254a97c6bd0c58ebf41358b9085ed2b5ced5ad87f1487903ff6787d7ac5082488b69d596cccc08336055a8176a0e97e6985652af8f455ee7557d11af20a060615bb835d24c56b4fd88fd3fc04df01341685dc603e70a38336cd"}, &(0x7f0000000700)=0xdd) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140), 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r6, &(0x7f0000000000)=0x100000, 0xfffc) [ 2158.383720] audit: type=1400 audit(2000001312.050:49728): avc: denied { map } for pid=28481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00b000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4, 0x0) 03:55:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) r2 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 03:55:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2158.518775] audit: type=1400 audit(2000001312.070:49729): avc: denied { map } for pid=28481 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4207, r0, 0x0, 0x13) tkill(r0, 0x38) ptrace$cont(0x3f, r0, 0x2, 0x80000000000000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000200)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x80000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r3, 0xa, "e291c1c4d16490417109"}, &(0x7f0000000180)=0x12) 03:55:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00c000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2158.675783] audit: type=1400 audit(2000001312.080:49730): avc: denied { map } for pid=28528 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:12 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000340)=""/63) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/86) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x100, r3, 0x220, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf39}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0xc1) ptrace$cont(0x7, r1, 0x0, 0x0) 03:55:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000002302190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2158.801225] audit: type=1400 audit(2000001312.100:49731): avc: denied { map } for pid=28528 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2158.922129] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=547 sclass=netlink_tcpdiag_socket pig=28871 comm=syz-executor.0 03:55:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5, 0x0) 03:55:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00e000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x4e24, 0x2000000}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4040, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) connect$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) [ 2159.041502] audit: type=1400 audit(2000001312.100:49732): avc: denied { map } for pid=28528 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000000c00e190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:13 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r1, r2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2159.168563] audit: type=1400 audit(2000001312.210:49734): avc: denied { map } for pid=28638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.198199] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3776 sclass=netlink_tcpdiag_socket pig=28962 comm=syz-executor.0 [ 2159.260807] audit: type=1400 audit(2000001312.210:49735): avc: denied { map } for pid=28638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.369251] audit: type=1400 audit(2000001312.210:49733): avc: denied { map } for pid=28659 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.455569] audit: type=1400 audit(2000001312.230:49736): avc: denied { map } for pid=28659 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2160.910472] net_ratelimit: 20 callbacks suppressed [ 2160.910481] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.920560] protocol 88fb is buggy, dev hsr_slave_1 [ 2161.150462] protocol 88fb is buggy, dev hsr_slave_0 [ 2161.150468] protocol 88fb is buggy, dev hsr_slave_0 [ 2161.150511] protocol 88fb is buggy, dev hsr_slave_1 [ 2161.155595] protocol 88fb is buggy, dev hsr_slave_1 [ 2161.950496] protocol 88fb is buggy, dev hsr_slave_0 [ 2161.955658] protocol 88fb is buggy, dev hsr_slave_1 [ 2162.510550] protocol 88fb is buggy, dev hsr_slave_0 [ 2162.515671] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.110571] net_ratelimit: 20 callbacks suppressed [ 2166.110579] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.120703] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.670537] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.675645] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.680932] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.685980] protocol 88fb is buggy, dev hsr_slave_1 [ 2167.150527] protocol 88fb is buggy, dev hsr_slave_0 [ 2167.155666] protocol 88fb is buggy, dev hsr_slave_1 [ 2167.390507] protocol 88fb is buggy, dev hsr_slave_0 [ 2167.390512] protocol 88fb is buggy, dev hsr_slave_0 03:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0xfc81) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:55:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x776e, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000000000000, 0x0) getpid() r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x143480, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x22) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00f000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001402190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6, 0x0) 03:55:22 executing program 2: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/autofs\x00', 0x105000, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000840)=0x80000000, 0x4) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x1) ioctl$KDMKTONE(r2, 0x4b30, 0x5) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:55:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4401, 0x82) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x100, 0x9, 0x7f, 0x8, 0x0, 0x4, 0x0, 0x4, 0x4490bafc, 0x8, 0xfffffffffffff22b, 0x40, 0x2, 0x3, 0x8000, 0x1, 0xe44f, 0x6, 0x8, 0xffffffffffffffe0, 0xb89c, 0x1f, 0x400000000000, 0xffffffffffffffff, 0x4b8b, 0x9, 0x7, 0x1bf4, 0x5, 0x4, 0x5, 0x3e2, 0x4, 0x9, 0xfffffffffffffffc, 0x4, 0x0, 0x80000001, 0x0, @perf_config_ext={0xd8bf, 0x8}, 0x410, 0x6e, 0x401, 0x2, 0x0, 0x2, 0xfffffffffffffffe}, r0, 0x8, r1, 0x3) [ 2169.037596] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=532 sclass=netlink_tcpdiag_socket pig=29080 comm=syz-executor.0 [ 2169.060072] kauditd_printk_skb: 43 callbacks suppressed [ 2169.060085] audit: type=1400 audit(2000001322.850:49780): avc: denied { map } for pid=29077 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c010000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) connect$rose(r1, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x880, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) [ 2169.161682] audit: type=1400 audit(2000001322.890:49781): avc: denied { map } for pid=29077 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001404190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7, 0x0) 03:55:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget(0xffffffffffffffff, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffffffffffffffd, 0x100) [ 2169.299732] audit: type=1400 audit(2000001322.960:49782): avc: denied { map } for pid=29105 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.431808] audit: type=1400 audit(2000001323.030:49783): avc: denied { map } for pid=29152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.512410] audit: type=1400 audit(2000001323.030:49784): avc: denied { map } for pid=29152 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.535714] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1044 sclass=netlink_tcpdiag_socket pig=29209 comm=syz-executor.0 [ 2169.573838] audit: type=1400 audit(2000001323.040:49785): avc: denied { map } for pid=29152 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.666050] audit: type=1400 audit(2000001323.060:49786): avc: denied { map } for pid=29152 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.704183] audit: type=1400 audit(2000001323.060:49787): avc: denied { map } for pid=29152 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.733077] audit: type=1400 audit(2000001323.130:49788): avc: denied { map } for pid=29200 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2169.765402] audit: type=1400 audit(2000001323.140:49789): avc: denied { map } for pid=29200 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000180)) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000100)={@mcast1, r3}, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r0, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) read$rfkill(r1, &(0x7f0000000080), 0x8) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffff, 0xffffffffffffffff, 0x3, 0x1, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) 03:55:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8, 0x0) 03:55:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000000140a190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c060000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2169.968550] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2580 sclass=netlink_tcpdiag_socket pig=29434 comm=syz-executor.0 03:55:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sendto(r0, &(0x7f0000000240)="0383b4357f6ca9befcc3e06b45297ab636d1cd0a97db1c9b6422574c1f848f8d81f77053037274c69930abe7afeab2fdb250288fd221237d05cae4e6bd186628145122ac87e53f44beac1b6f1e069a9f35506b60a3f35971094ed127734ed9d42fcdd67a7d8b0fe31b11eed32c83b87d2668b46b7a94c2cfa658e01b59e05597996398f37dd63515df506720ca713e76cbb1dce4b0f60cc72fa002ed7da5a607320cb84f478ea5f7ab3efbf4fba8279f859705d8a0a071f277ad246a34d40626a3a0f8356a9763", 0xc7, 0x80, &(0x7f0000000340)=@tipc=@name={0x1e, 0x2, 0x1, {{0x43, 0x4}, 0x2}}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000180)={0x30, 0xfffffffffffffffe, 0x1, 0x8, 0x100000001, 0x6, 0x692d, 0xf685}, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffee8, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x1e802360, 0x80000) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) write$selinux_access(r4, &(0x7f00000000c0)={'system_u:object_r:default_context_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xfffffffffffffffd}, 0x4b) 03:55:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0e0000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000000140e190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9, 0x0) 03:55:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x12f68) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x48000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xd0, r4, 0x810, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @remote, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xff, @mcast1, 0x7ff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb95}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x23}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdb6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdaee}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000) connect$inet6(r2, &(0x7f0000000140), 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r5, &(0x7f0000000000)=0x100000, 0xfffc) [ 2170.240119] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3604 sclass=netlink_tcpdiag_socket pig=29549 comm=syz-executor.0 03:55:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000000140f190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2170.388339] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3860 sclass=netlink_tcpdiag_socket pig=29559 comm=syz-executor.0 [ 2171.320471] net_ratelimit: 19 callbacks suppressed [ 2171.320478] protocol 88fb is buggy, dev hsr_slave_0 [ 2171.330611] protocol 88fb is buggy, dev hsr_slave_1 [ 2171.550492] protocol 88fb is buggy, dev hsr_slave_0 [ 2171.550497] protocol 88fb is buggy, dev hsr_slave_0 [ 2171.550539] protocol 88fb is buggy, dev hsr_slave_1 [ 2171.555731] protocol 88fb is buggy, dev hsr_slave_1 [ 2172.350475] protocol 88fb is buggy, dev hsr_slave_0 [ 2172.356193] protocol 88fb is buggy, dev hsr_slave_1 03:55:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x81) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0xfffffffffffffd11, 0x0, 0xfffffffffffffffa, 0x7, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000000c0)={'bcsf0\x00', 0x1}) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) [ 2172.910459] protocol 88fb is buggy, dev hsr_slave_0 [ 2172.915691] protocol 88fb is buggy, dev hsr_slave_1 [ 2176.510573] net_ratelimit: 20 callbacks suppressed [ 2176.515759] protocol 88fb is buggy, dev hsr_slave_0 [ 2176.520903] protocol 88fb is buggy, dev hsr_slave_1 [ 2177.070489] protocol 88fb is buggy, dev hsr_slave_0 [ 2177.075573] protocol 88fb is buggy, dev hsr_slave_1 [ 2177.080679] protocol 88fb is buggy, dev hsr_slave_0 [ 2177.085697] protocol 88fb is buggy, dev hsr_slave_1 [ 2177.550550] protocol 88fb is buggy, dev hsr_slave_0 [ 2177.555711] protocol 88fb is buggy, dev hsr_slave_1 [ 2177.790482] protocol 88fb is buggy, dev hsr_slave_0 [ 2177.795565] protocol 88fb is buggy, dev hsr_slave_1 03:55:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0xa94e, 0x4) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:55:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001460190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0f0000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa, 0x0) 03:55:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="a1d700000000000004000000000000000700000000000000", @ANYRES32=r0, @ANYBLOB="000000000100008000"/28, @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32=r1, @ANYBLOB="000000000400"/28, @ANYRES32=r1, @ANYBLOB="000000000600"/28, @ANYRES32=r1, @ANYBLOB='\x00'/28, @ANYRES32=r1, @ANYBLOB="000000001874000000000000000000000000008c0000000000000000", @ANYRES32=r1, @ANYBLOB="000000008ab000"/28]) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x200) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000340)={0x4, @raw_data="d3e414cfb3207873f0c61677172dd57ac52e4d7edd8b621944686f0df83b9ddca9fb519a46a48ea1caa89d4a07e5cdd47f6221aa93dc03ef02557672dae2c85c485e8956426702ed56548620c33516924d1cd40b88e968b80491124e779b4850c726806d45ed3f8d300632d2b797b2e081838ae68657c4038199a5db12382b1c607b296a8e609f7a78eb598e878b4c7ff59523f21218c62cdd3270647548453e8faebd82b910a99f53e87095a63b29c7dbba5dadc9f0197c89ec5809b72bbfaa64995c4fc64c86df"}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0x400, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000180)={r3, 0x1}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140), 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:34 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x8, 0x80000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000001c0)={{0x9, 0x6, 0x3, 0x7, '\x00', 0x90}, 0x3, 0x63, 0x1, r0, 0x1, 0x80, 'syz0\x00', &(0x7f0000000180)=['/dev/dsp\x00'], 0x9, [], [0x21, 0xfffffffffffff008, 0x400, 0x6]}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x1ffffffd, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000040)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2180.569508] kauditd_printk_skb: 50 callbacks suppressed [ 2180.569522] audit: type=1400 audit(2000001334.360:49840): avc: denied { map } for pid=29673 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.611175] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=24596 sclass=netlink_tcpdiag_socket pig=29684 comm=syz-executor.0 03:55:34 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$getregset(0x4204, r0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=""/180, 0xb4}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) msgget(0x1, 0x7) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4800000014e0190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2180.651981] audit: type=1400 audit(2000001334.400:49841): avc: denied { map } for pid=29673 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fc000000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r1}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000180)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, r4, 0x9, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8}]}, 0x1c}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000140), 0x1c) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40080006}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r6, 0x101, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff04}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40005}, 0x4000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r7, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb, 0x0) [ 2180.750214] audit: type=1400 audit(2000001334.420:49842): avc: denied { map } for pid=29673 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.847308] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=57364 sclass=netlink_tcpdiag_socket pig=29796 comm=syz-executor.0 [ 2180.917921] audit: type=1400 audit(2000001334.550:49843): avc: denied { map } for pid=29776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000030000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2181.013812] audit: type=1400 audit(2000001334.560:49844): avc: denied { map } for pid=29776 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.128243] audit: type=1400 audit(2000001334.570:49845): avc: denied { map } for pid=29776 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.190261] audit: type=1400 audit(2000001334.580:49846): avc: denied { map } for pid=29776 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.217875] audit: type=1400 audit(2000001334.580:49847): avc: denied { map } for pid=29784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.240714] audit: type=1400 audit(2000001334.600:49848): avc: denied { map } for pid=29784 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.263712] audit: type=1400 audit(2000001334.600:49849): avc: denied { map } for pid=29784 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2181.710478] net_ratelimit: 20 callbacks suppressed [ 2181.710486] protocol 88fb is buggy, dev hsr_slave_0 [ 2181.721126] protocol 88fb is buggy, dev hsr_slave_1 [ 2181.950447] protocol 88fb is buggy, dev hsr_slave_0 [ 2181.950473] protocol 88fb is buggy, dev hsr_slave_0 [ 2181.955612] protocol 88fb is buggy, dev hsr_slave_1 [ 2181.960633] protocol 88fb is buggy, dev hsr_slave_1 [ 2182.750527] protocol 88fb is buggy, dev hsr_slave_0 [ 2182.755693] protocol 88fb is buggy, dev hsr_slave_1 [ 2183.310504] protocol 88fb is buggy, dev hsr_slave_0 [ 2183.315609] protocol 88fb is buggy, dev hsr_slave_1 [ 2186.910585] net_ratelimit: 19 callbacks suppressed [ 2186.915607] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.920703] protocol 88fb is buggy, dev hsr_slave_1 [ 2187.470552] protocol 88fb is buggy, dev hsr_slave_0 [ 2187.475653] protocol 88fb is buggy, dev hsr_slave_1 [ 2187.480986] protocol 88fb is buggy, dev hsr_slave_0 [ 2187.486180] protocol 88fb is buggy, dev hsr_slave_1 [ 2187.950519] protocol 88fb is buggy, dev hsr_slave_0 [ 2187.955673] protocol 88fb is buggy, dev hsr_slave_1 [ 2188.190529] protocol 88fb is buggy, dev hsr_slave_0 [ 2188.190534] protocol 88fb is buggy, dev hsr_slave_0 03:55:44 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r0, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) read$rfkill(r1, &(0x7f0000000080), 0x8) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0xffc0000, &(0x7f0000000100)=0x4) 03:55:44 executing program 2: clone(0x40014002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000002c0)={{0x6, 0x7, 0x8, 0x4, '\x00', 0x7}, 0x2, 0x408, 0x0, r1, 0x3, 0xdb96, 'syz1\x00', &(0x7f0000000080)=['\x00', '/dev/swradio#\x00', '\\.vboxnet0|vboxnet0{GPLvmnet0loppp0\x00'], 0x33, [], [0x6484c5a4, 0x8000000, 0x5, 0x1000]}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r2 = gettid() r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4209, r2, 0x1, 0x2) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000400)='/dev/v4l-subdev#\x00', 0x4ad, 0x14080) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x20803, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 03:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400200a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f00000000c0)={0x2, [0x0, 0x0]}) sendfile(r2, r3, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:44 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c046030000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc, 0x0) 03:55:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000200)="6c277a572366d9b15447a64da500020000000000007ee60843aeb51241a39a0f638f5cf606cb461672b1190cf33a0841399a6ca2ea86f507a1ec84ed0195148fa1", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x40001, 0x11, r2, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x2000, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x1, 0x0) getpid() r3 = dup3(r1, r1, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x0, {0xfd, 0x80000000, 0x7, 0x1, 0x0, 0x945}}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x2}, 0x28, 0x1) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140), 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="48000000140fff0a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:44 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x2c28, 0x5, 0x4, 0x1, 0xa, 0x100000001, 0x66800000, 0x15, 0x4f6c9b74, 0x3ff}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2190.847379] kauditd_printk_skb: 23 callbacks suppressed [ 2190.847392] audit: type=1400 audit(2000001344.640:49873): avc: denied { map } for pid=29925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:44 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c047030000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2190.989083] audit: type=1400 audit(2000001344.690:49874): avc: denied { map } for pid=29925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.031338] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3860 sclass=netlink_tcpdiag_socket pig=29991 comm=syz-executor.0 03:55:44 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190fffffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2191.121517] audit: type=1400 audit(2000001344.690:49875): avc: denied { map } for pid=29925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.299757] audit: type=1400 audit(2000001344.700:49876): avc: denied { map } for pid=29925 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.430018] audit: type=1400 audit(2000001344.710:49877): avc: denied { map } for pid=29925 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.455488] audit: type=1400 audit(2000001344.710:49878): avc: denied { map } for pid=29925 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.479939] audit: type=1400 audit(2000001344.710:49879): avc: denied { map } for pid=29938 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.504125] audit: type=1400 audit(2000001344.840:49880): avc: denied { map } for pid=29974 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.526475] audit: type=1400 audit(2000001344.840:49881): avc: denied { map } for pid=29974 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.549675] audit: type=1400 audit(2000001344.840:49882): avc: denied { map } for pid=29956 comm="syz-executor.3" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=246755 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 2192.111165] net_ratelimit: 20 callbacks suppressed [ 2192.111171] protocol 88fb is buggy, dev hsr_slave_0 [ 2192.121269] protocol 88fb is buggy, dev hsr_slave_1 [ 2192.350483] protocol 88fb is buggy, dev hsr_slave_0 [ 2192.350638] protocol 88fb is buggy, dev hsr_slave_0 [ 2192.355964] protocol 88fb is buggy, dev hsr_slave_1 [ 2192.361073] protocol 88fb is buggy, dev hsr_slave_1 [ 2193.150509] protocol 88fb is buggy, dev hsr_slave_0 [ 2193.155731] protocol 88fb is buggy, dev hsr_slave_1 [ 2193.710476] protocol 88fb is buggy, dev hsr_slave_0 [ 2193.715658] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.310550] net_ratelimit: 18 callbacks suppressed [ 2197.310555] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.320715] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.870485] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.876804] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.881959] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.886982] protocol 88fb is buggy, dev hsr_slave_1 [ 2198.350542] protocol 88fb is buggy, dev hsr_slave_0 [ 2198.355727] protocol 88fb is buggy, dev hsr_slave_1 [ 2198.590511] protocol 88fb is buggy, dev hsr_slave_0 [ 2198.590533] protocol 88fb is buggy, dev hsr_slave_0 03:55:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x800, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000440), 0x0) r3 = msgget$private(0x0, 0xa) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000100)=""/59) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f0000000080), 0x8) 03:55:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0) 03:55:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) 03:55:54 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000050000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:55:54 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'raw\x00', 0xad, "dd39754b26c1bc56ae0d9fa348408029473d8713815a01f208201da588cb969eb6be1c0e062ba10a57a80d1cd4351893f8fafc46caef5cc67d6f23276458c8d3a06ffe235338d066c86a8dbd9f6a7bf80ab4e9051e3ef0f1cf1e1bca228a5c1542ec14cd5f2b5683361b89e2ec3fa0e35143147688a103e5e581e5522bfc915f5814c0de7ca9dad9aace757713b43bc76bab7e1c2df443b07313e995254be4718f7384022a4aa5a3722ad05c27"}, &(0x7f0000000040)=0xd1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a02ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:54 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000060000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2201.059469] kauditd_printk_skb: 26 callbacks suppressed [ 2201.059482] audit: type=1400 audit(2000001354.850:49909): avc: denied { map } for pid=30066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a03ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x82400, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000180)) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000340)={@loopback, @broadcast}, 0x8) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000240)={0x2, 0x9, 0x8200, 0x7fffffff, 0x2, 0x7f, 0x100, 0x8, 0x0}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000002c0)={0x1ff, 0x3, 0x8, 0x1, 0x2, 0xcc, 0x9, 0x15, r4}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000380)) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x90a00, 0x0) sendfile(r3, r5, &(0x7f0000000000)=0x100000, 0xfffc) sendfile(r0, r3, &(0x7f00000000c0), 0x6) [ 2201.167379] audit: type=1400 audit(2000001354.850:49910): avc: denied { map } for pid=30066 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xe, 0x0) [ 2201.280743] audit: type=1400 audit(2000001354.960:49911): avc: denied { map } for pid=30128 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a04ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:55:55 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000090000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2201.348027] audit: type=1400 audit(2000001354.960:49912): avc: denied { map } for pid=30128 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.473112] audit: type=1400 audit(2000001354.960:49913): avc: denied { map } for pid=30128 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.564131] audit: type=1400 audit(2000001354.990:49914): avc: denied { map } for pid=30128 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.605664] audit: type=1400 audit(2000001354.990:49915): avc: denied { map } for pid=30128 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.641911] audit: type=1400 audit(2000001355.000:49916): avc: denied { map } for pid=30128 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.667303] audit: type=1400 audit(2000001355.000:49917): avc: denied { map } for pid=30128 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2201.699855] audit: type=1400 audit(2000001355.060:49918): avc: denied { map } for pid=30182 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.510540] net_ratelimit: 20 callbacks suppressed [ 2202.510548] protocol 88fb is buggy, dev hsr_slave_0 [ 2202.520969] protocol 88fb is buggy, dev hsr_slave_1 [ 2202.750477] protocol 88fb is buggy, dev hsr_slave_0 [ 2202.750482] protocol 88fb is buggy, dev hsr_slave_0 [ 2202.750536] protocol 88fb is buggy, dev hsr_slave_1 [ 2202.755607] protocol 88fb is buggy, dev hsr_slave_1 [ 2203.550527] protocol 88fb is buggy, dev hsr_slave_0 [ 2203.555688] protocol 88fb is buggy, dev hsr_slave_1 [ 2204.110499] protocol 88fb is buggy, dev hsr_slave_0 [ 2204.115649] protocol 88fb is buggy, dev hsr_slave_1 [ 2207.710537] net_ratelimit: 20 callbacks suppressed [ 2207.710543] protocol 88fb is buggy, dev hsr_slave_0 [ 2207.720651] protocol 88fb is buggy, dev hsr_slave_1 [ 2208.270516] protocol 88fb is buggy, dev hsr_slave_0 [ 2208.275638] protocol 88fb is buggy, dev hsr_slave_1 [ 2208.280806] protocol 88fb is buggy, dev hsr_slave_0 [ 2208.285829] protocol 88fb is buggy, dev hsr_slave_1 [ 2208.750513] protocol 88fb is buggy, dev hsr_slave_0 [ 2208.755673] protocol 88fb is buggy, dev hsr_slave_1 [ 2208.990505] protocol 88fb is buggy, dev hsr_slave_0 [ 2208.990510] protocol 88fb is buggy, dev hsr_slave_0 03:56:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a05ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) recvfrom$x25(r2, &(0x7f0000000100)=""/4096, 0x1000, 0x20, 0x0, 0x0) 03:56:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) wait4(0x0, 0x0, 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xf, 0x0) 03:56:05 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000a0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x40b7, 0x8000, "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", 0x64, 0x8, 0x5, 0x8, 0x3, 0xfffffffffffffff9, 0x1}, r4}}, 0x128) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:56:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a06ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2211.316552] kauditd_printk_skb: 28 callbacks suppressed [ 2211.316566] audit: type=1400 audit(2000001365.110:49947): avc: denied { map } for pid=30319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:05 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000b0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x100, 0x0) fallocate(r1, 0x40, 0x81, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000340)={r4, 0x10}) r5 = msgget(0x3, 0x180) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000240)=""/175) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000140), 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') rt_tgsigqueueinfo(r6, r6, 0x2e, &(0x7f0000000180)={0x1c, 0x6, 0xf8000000000000}) sendfile(r7, r8, &(0x7f0000000000)=0x100000, 0xfffc) [ 2211.458785] audit: type=1400 audit(2000001365.150:49948): avc: denied { map } for pid=30319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x10, 0x0) 03:56:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a07ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2211.598538] audit: type=1400 audit(2000001365.150:49949): avc: denied { map } for pid=30319 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x29) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x1ac7a4d3, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2211.714742] audit: type=1400 audit(2000001365.150:49950): avc: denied { map } for pid=30319 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.848578] audit: type=1400 audit(2000001365.170:49951): avc: denied { map } for pid=30319 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.955230] audit: type=1400 audit(2000001365.230:49952): avc: denied { map } for pid=30362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.978467] audit: type=1400 audit(2000001365.240:49953): avc: denied { map } for pid=30362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.003479] audit: type=1400 audit(2000001365.240:49954): avc: denied { map } for pid=30362 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.026168] audit: type=1400 audit(2000001365.360:49955): avc: denied { map } for pid=30417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.050101] audit: type=1400 audit(2000001365.440:49956): avc: denied { map } for pid=30486 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2212.910637] net_ratelimit: 20 callbacks suppressed [ 2212.910644] protocol 88fb is buggy, dev hsr_slave_0 [ 2212.920839] protocol 88fb is buggy, dev hsr_slave_1 [ 2213.150486] protocol 88fb is buggy, dev hsr_slave_0 [ 2213.150491] protocol 88fb is buggy, dev hsr_slave_0 [ 2213.150544] protocol 88fb is buggy, dev hsr_slave_1 [ 2213.155653] protocol 88fb is buggy, dev hsr_slave_1 [ 2213.950525] protocol 88fb is buggy, dev hsr_slave_0 [ 2213.955666] protocol 88fb is buggy, dev hsr_slave_1 [ 2214.510528] protocol 88fb is buggy, dev hsr_slave_0 [ 2214.515623] protocol 88fb is buggy, dev hsr_slave_1 [ 2218.110538] net_ratelimit: 20 callbacks suppressed [ 2218.115539] protocol 88fb is buggy, dev hsr_slave_0 [ 2218.120639] protocol 88fb is buggy, dev hsr_slave_1 [ 2218.670517] protocol 88fb is buggy, dev hsr_slave_0 [ 2218.675612] protocol 88fb is buggy, dev hsr_slave_1 [ 2218.680724] protocol 88fb is buggy, dev hsr_slave_0 [ 2218.685754] protocol 88fb is buggy, dev hsr_slave_1 [ 2219.150524] protocol 88fb is buggy, dev hsr_slave_0 [ 2219.155637] protocol 88fb is buggy, dev hsr_slave_1 [ 2219.390507] protocol 88fb is buggy, dev hsr_slave_0 [ 2219.390512] protocol 88fb is buggy, dev hsr_slave_0 03:56:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0000000000000000000000618d4fb61e0a83f82d58d899ebc2a2ea391194d90f53fba7fd8d6e314e30f0b3cccf30e4aac8d93ec9ea9fb509f2f82bbd6bc00250ac11012f44ec491695579f366b2d9768baa283de56a61911bcc86f266e50364a2eaac2962284774dfec2ec02ec73c8eced7d5a41706629e27967b2142890726cb0f1f99dc8618154b39977f9085aa2a83743654c3d29af9f6559c6963068183c20fe110caeda20947f0c0f85ee4e0dc218f788acd0097a8c874b825e90620f8758c0ca66ef7d8983b90ecec0db337aaf9e58") r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x20000, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000100)=[0x0, 0x78]) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:56:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000c0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a08ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0x400000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x8, 0x0, 0x10003, 0x7}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f00000001c0)={r3, 0x39ab}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000340)=[@in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0xbd, @loopback, 0x2}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e22, 0xffff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, 0x2}], 0x58) connect$inet6(r4, &(0x7f0000000140), 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0xfffc) 03:56:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x11, 0x0) 03:56:15 executing program 2: clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) tkill(r0, 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2222.194320] kauditd_printk_skb: 27 callbacks suppressed [ 2222.194334] audit: type=1400 audit(2000001375.990:49984): avc: denied { map } for pid=30672 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a09ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:16 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000e0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:16 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setopts(0x4206, r0, 0x2e18, 0x20) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2222.237076] audit: type=1400 audit(2000001376.020:49985): avc: denied { map } for pid=30672 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7ff, 0x20002) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0xfffc) [ 2222.307565] audit: type=1400 audit(2000001376.020:49986): avc: denied { map } for pid=30672 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.423785] audit: type=1400 audit(2000001376.020:49987): avc: denied { map } for pid=30672 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0affff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:16 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2222.510223] audit: type=1400 audit(2000001376.160:49988): avc: denied { map } for pid=30691 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.616687] audit: type=1400 audit(2000001376.170:49989): avc: denied { map } for pid=30692 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.691210] audit: type=1400 audit(2000001376.180:49990): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.738903] audit: type=1400 audit(2000001376.180:49991): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.763861] audit: type=1400 audit(2000001376.190:49992): avc: denied { map } for pid=30692 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2222.789105] audit: type=1400 audit(2000001376.270:49993): avc: denied { map } for pid=30765 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.310504] net_ratelimit: 20 callbacks suppressed [ 2223.310509] protocol 88fb is buggy, dev hsr_slave_0 [ 2223.320733] protocol 88fb is buggy, dev hsr_slave_1 [ 2223.550475] protocol 88fb is buggy, dev hsr_slave_0 [ 2223.550493] protocol 88fb is buggy, dev hsr_slave_0 [ 2223.555778] protocol 88fb is buggy, dev hsr_slave_1 [ 2223.560767] protocol 88fb is buggy, dev hsr_slave_1 [ 2224.350488] protocol 88fb is buggy, dev hsr_slave_0 [ 2224.355650] protocol 88fb is buggy, dev hsr_slave_1 [ 2224.910483] protocol 88fb is buggy, dev hsr_slave_0 [ 2224.915592] protocol 88fb is buggy, dev hsr_slave_1 [ 2228.510562] net_ratelimit: 20 callbacks suppressed [ 2228.510570] protocol 88fb is buggy, dev hsr_slave_0 [ 2228.520752] protocol 88fb is buggy, dev hsr_slave_1 [ 2229.070539] protocol 88fb is buggy, dev hsr_slave_0 [ 2229.075717] protocol 88fb is buggy, dev hsr_slave_1 [ 2229.080816] protocol 88fb is buggy, dev hsr_slave_0 [ 2229.085848] protocol 88fb is buggy, dev hsr_slave_1 [ 2229.550546] protocol 88fb is buggy, dev hsr_slave_0 [ 2229.555692] protocol 88fb is buggy, dev hsr_slave_1 [ 2229.790521] protocol 88fb is buggy, dev hsr_slave_0 [ 2229.790526] protocol 88fb is buggy, dev hsr_slave_0 03:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000140)="0adc1f123c123f31b5d07053f27dba4c64b9e477c92effb96d7d2312827673256d4085e3c9a7c01faff579940453aa378b08d6678ee449105a849f80ff0f4a68f1eff99145ca33ccf25fb1ed0718b4d814bfd0a6f2f89143132af1d96eb63279e1ec7e161d22a7744b3de4fbeb9358da3a3e47aed0a9152f8da1f7148959fff3b1f98f35ded4abf85ca2a0088f30e67776089595b89e521805bbcfa8b70bcb2633bf6a0c511d3ffd29701563b8a12c7c37c09ad2fd8e7c84fbeeffcfb94c24d889646211c87692b78e1e012a457e562ac4f201bdf7e23cbd9c43125f32940cfae50867f49951b75468133f510beb") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000100), 0xfffffe09) 03:56:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x12, 0x0) 03:56:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000f0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) dup2(r0, r1) 03:56:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000300)={0x30, 0x2, 0x1, 0x59e9, 0x100000001, 0x8, 0x100000001, 0x80}, 0x0) tkill(r0, 0x38) r1 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x400, 0xc00) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000380)={0xffffffffffffffff, "47c5c85059b66d6b27d468a4b8e858691706f65663f70afaf6f5a0b577814817", 0x1, 0x8001, 0x4, 0x180, 0x6}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0xa040, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={r0, r3, r4}, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0bffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0c51a0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0cffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x40000018, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f0000000040)=@raw=[@generic={0x2, 0x3f, 0x9, 0x5, 0x7f}, @ldst={0x1, 0x0, 0x7, 0xf, 0x5, 0x1, 0xffffffffffffffff}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xfe, &(0x7f0000000200)=""/254, 0x41f00, 0x1, [], 0x0, 0xc, 0xffffffffffffff9c, 0x8, &(0x7f0000000300)={0x6e4, 0x10001}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0x47, 0x8, 0x80000000}, 0x10}, 0x70) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000400)) ptrace$cont(0x7, r0, 0x0, 0x0) wait4(r0, &(0x7f0000000000), 0x20000000, &(0x7f0000000140)) [ 2232.458715] kauditd_printk_skb: 9 callbacks suppressed [ 2232.458729] audit: type=1400 audit(2000001386.250:50003): avc: denied { map } for pid=30818 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.527988] audit: type=1400 audit(2000001386.260:50004): avc: denied { map } for pid=30818 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0dffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x13, 0x0) 03:56:26 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/23, 0x17}], 0x2}}], 0x1, 0x0, 0x0) [ 2232.695103] audit: type=1400 audit(2000001386.490:50005): avc: denied { map } for pid=31031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.802114] audit: type=1400 audit(2000001386.520:50006): avc: denied { map } for pid=31032 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.848174] audit: type=1400 audit(2000001386.520:50007): avc: denied { map } for pid=31031 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.881335] audit: type=1400 audit(2000001386.530:50008): avc: denied { map } for pid=31032 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.921068] audit: type=1400 audit(2000001386.540:50009): avc: denied { map } for pid=31031 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.946667] audit: type=1400 audit(2000001386.560:50010): avc: denied { map } for pid=31037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.980243] audit: type=1400 audit(2000001386.710:50011): avc: denied { map } for pid=31110 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.004491] audit: type=1400 audit(2000001386.710:50012): avc: denied { map } for pid=31110 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.710474] net_ratelimit: 20 callbacks suppressed [ 2233.710481] protocol 88fb is buggy, dev hsr_slave_0 [ 2233.720607] protocol 88fb is buggy, dev hsr_slave_1 [ 2233.950469] protocol 88fb is buggy, dev hsr_slave_0 [ 2233.955580] protocol 88fb is buggy, dev hsr_slave_1 [ 2233.960423] protocol 88fb is buggy, dev hsr_slave_0 [ 2233.965674] protocol 88fb is buggy, dev hsr_slave_1 [ 2234.750570] protocol 88fb is buggy, dev hsr_slave_0 [ 2234.755673] protocol 88fb is buggy, dev hsr_slave_1 [ 2235.310480] protocol 88fb is buggy, dev hsr_slave_0 [ 2235.315616] protocol 88fb is buggy, dev hsr_slave_1 [ 2238.910590] net_ratelimit: 20 callbacks suppressed [ 2238.915626] protocol 88fb is buggy, dev hsr_slave_0 [ 2238.920910] protocol 88fb is buggy, dev hsr_slave_1 [ 2239.470551] protocol 88fb is buggy, dev hsr_slave_0 [ 2239.475855] protocol 88fb is buggy, dev hsr_slave_1 [ 2239.481145] protocol 88fb is buggy, dev hsr_slave_0 [ 2239.486178] protocol 88fb is buggy, dev hsr_slave_1 [ 2239.950558] protocol 88fb is buggy, dev hsr_slave_0 [ 2239.955927] protocol 88fb is buggy, dev hsr_slave_1 [ 2240.190537] protocol 88fb is buggy, dev hsr_slave_0 [ 2240.190542] protocol 88fb is buggy, dev hsr_slave_0 03:56:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x23, r0, 0x4, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000040)) 03:56:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt:$\xe7\xed\xfa\x16r<|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93') mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, 0x0, 0x1) 03:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0effff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x14, 0x0) 03:56:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0003f0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c003460000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0xd) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x9, 0x4) [ 2242.683083] kauditd_printk_skb: 2 callbacks suppressed [ 2242.683096] audit: type=1400 audit(2000001396.480:50015): avc: denied { map } for pid=31260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a0fffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2242.820134] audit: type=1400 audit(2000001396.510:50016): avc: denied { map } for pid=31260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x15, 0x0) 03:56:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c003470000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x80000000, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x121502, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2242.988985] audit: type=1400 audit(2000001396.660:50017): avc: denied { map } for pid=31370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:36 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x80000005) rmdir(&(0x7f0000000280)='./file0\x00') [ 2243.163552] audit: type=1400 audit(2000001396.670:50018): avc: denied { map } for pid=31370 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.218501] audit: type=1400 audit(2000001396.670:50019): avc: denied { map } for pid=31370 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.244319] audit: type=1400 audit(2000001396.690:50020): avc: denied { map } for pid=31406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.268733] audit: type=1400 audit(2000001396.700:50021): avc: denied { map } for pid=31406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.322614] audit: type=1400 audit(2000001396.720:50022): avc: denied { map } for pid=31406 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.356607] audit: type=1400 audit(2000001396.730:50023): avc: denied { map } for pid=31406 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2243.408868] audit: type=1400 audit(2000001396.750:50024): avc: denied { map } for pid=31447 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2244.110486] net_ratelimit: 20 callbacks suppressed [ 2244.110493] protocol 88fb is buggy, dev hsr_slave_0 [ 2244.120620] protocol 88fb is buggy, dev hsr_slave_1 [ 2244.350561] protocol 88fb is buggy, dev hsr_slave_0 [ 2244.355663] protocol 88fb is buggy, dev hsr_slave_1 [ 2244.360466] protocol 88fb is buggy, dev hsr_slave_0 [ 2244.365766] protocol 88fb is buggy, dev hsr_slave_1 [ 2245.150531] protocol 88fb is buggy, dev hsr_slave_0 [ 2245.155716] protocol 88fb is buggy, dev hsr_slave_1 [ 2245.720458] protocol 88fb is buggy, dev hsr_slave_0 [ 2245.725564] protocol 88fb is buggy, dev hsr_slave_1 [ 2249.310561] net_ratelimit: 20 callbacks suppressed [ 2249.315566] protocol 88fb is buggy, dev hsr_slave_0 [ 2249.320686] protocol 88fb is buggy, dev hsr_slave_1 [ 2249.870528] protocol 88fb is buggy, dev hsr_slave_0 [ 2249.875607] protocol 88fb is buggy, dev hsr_slave_1 [ 2249.880762] protocol 88fb is buggy, dev hsr_slave_0 [ 2249.885816] protocol 88fb is buggy, dev hsr_slave_1 [ 2250.350490] protocol 88fb is buggy, dev hsr_slave_0 [ 2250.355649] protocol 88fb is buggy, dev hsr_slave_1 [ 2250.590492] protocol 88fb is buggy, dev hsr_slave_0 [ 2250.590508] protocol 88fb is buggy, dev hsr_slave_0 03:56:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000100)=""/146) 03:56:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x1ff, 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getpgrp(0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a10ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:46 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c065580000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x16, 0x0) 03:56:46 executing program 2: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clone(0x40800, &(0x7f0000000140)="2c79307f6ce1ffa0815577cf9644b3d64ef4c76005915570592e01b80fa7479477d24274940c84ce4533d7b588b7848e4c6255f9e033108a52d75060ec3a5b91f5faa3a218a217bff863826104ad61ce0cde7d948ecb15fe", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000200)="e403821babb8b2fa0580298cdc1e1d4c5b88b554d46258616a85095853ca24954084fd0cb164d30e719bf4ee0739bde7eb87eb817b07630e11b51b6f2fb4d447b73d1d4e2478289919f5f28937bc2e934a9710f0a3844e2efe692b764746f172a7c02644c168e25e18f526d81c407168c831fd93f09e347b8c3860085135ec1d243e0748c34370e48923b5202ff8bb3f72e5771b7e20cac3102401a3ed832d05c280a56e28f9cfddf7258a490d") ptrace$setregset(0x4205, r0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)="dd42bc56a2b582574e8313f11759b8d23d3c7fa082f9295e0254e9003fd494ad5f101fb3b496dcaf00000062fa6fd0983dd318db43453d430d7049609637c6ae238013bfa664ba8889be2be4f32572ffcc6d5d6d90ff0000005601a6bb2cf9acc515e03761dfd0ef8a4db4813415444e7068ad9c03c9b081339cc304514bfa26dfdf81937824cfb44dc878b3de00"/156, 0x37b}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0xe, 0x2, 0x9c47}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:46 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000600000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2252.937198] kauditd_printk_skb: 20 callbacks suppressed [ 2252.937210] audit: type=1400 audit(2000001406.730:50045): avc: denied { map } for pid=31709 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a11ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:46 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$P9_RSTAT(r1, &(0x7f0000000000)={0x51, 0x7d, 0x1, {0x0, 0x4a, 0x4, 0x4, {0x2, 0x2, 0x3}, 0x80000000, 0x8, 0x0, 0x6858, 0x0, '', 0x7, 'usystem', 0x6, '\\#eth0', 0xa, 'mime_type^'}}, 0x51) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2253.036358] audit: type=1400 audit(2000001406.730:50046): avc: denied { map } for pid=31709 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:56:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x17, 0x0) 03:56:47 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c058650000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2253.253808] audit: type=1400 audit(2000001406.770:50047): avc: denied { map } for pid=31709 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.437310] audit: type=1400 audit(2000001406.830:50048): avc: denied { map } for pid=31779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.519622] audit: type=1400 audit(2000001406.830:50049): avc: denied { map } for pid=31779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.553405] audit: type=1400 audit(2000001406.910:50050): avc: denied { map } for pid=31916 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.584856] audit: type=1400 audit(2000001406.910:50051): avc: denied { map } for pid=31916 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.615544] audit: type=1400 audit(2000001406.990:50052): avc: denied { map } for pid=31925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.639562] audit: type=1400 audit(2000001406.990:50053): avc: denied { map } for pid=31925 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2253.664454] audit: type=1400 audit(2000001407.050:50054): avc: denied { map } for pid=31925 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.510563] net_ratelimit: 20 callbacks suppressed [ 2254.510571] protocol 88fb is buggy, dev hsr_slave_0 [ 2254.520735] protocol 88fb is buggy, dev hsr_slave_1 [ 2254.750510] protocol 88fb is buggy, dev hsr_slave_0 [ 2254.750570] protocol 88fb is buggy, dev hsr_slave_0 [ 2254.755646] protocol 88fb is buggy, dev hsr_slave_1 [ 2254.760710] protocol 88fb is buggy, dev hsr_slave_1 [ 2255.550535] protocol 88fb is buggy, dev hsr_slave_0 [ 2255.555733] protocol 88fb is buggy, dev hsr_slave_1 [ 2256.110519] protocol 88fb is buggy, dev hsr_slave_0 [ 2256.115675] protocol 88fb is buggy, dev hsr_slave_1 [ 2259.710517] net_ratelimit: 20 callbacks suppressed [ 2259.710523] protocol 88fb is buggy, dev hsr_slave_0 [ 2259.720608] protocol 88fb is buggy, dev hsr_slave_1 [ 2260.270504] protocol 88fb is buggy, dev hsr_slave_0 [ 2260.275615] protocol 88fb is buggy, dev hsr_slave_1 [ 2260.280700] protocol 88fb is buggy, dev hsr_slave_0 [ 2260.285736] protocol 88fb is buggy, dev hsr_slave_1 [ 2260.750515] protocol 88fb is buggy, dev hsr_slave_0 [ 2260.755636] protocol 88fb is buggy, dev hsr_slave_1 [ 2260.990492] protocol 88fb is buggy, dev hsr_slave_0 [ 2260.990496] protocol 88fb is buggy, dev hsr_slave_0 03:56:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000040), 0x8) 03:56:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a12ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) exit_group(0xfffffffffffffff9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x18, 0x0) 03:56:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fe800000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:57 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r1, 0x4b6c, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x28, 0x1, @scatter={0x9, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}, {&(0x7f0000000400)=""/216, 0xd8}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) [ 2263.802185] kauditd_printk_skb: 16 callbacks suppressed [ 2263.802198] audit: type=1400 audit(2000001417.600:50071): avc: denied { map } for pid=32260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2263.822529] IPVS: ftp: loaded support on port[0] = 21 03:56:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a13ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2263.874221] audit: type=1400 audit(2000001417.630:50072): avc: denied { map } for pid=32260 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = mq_open(&(0x7f0000000000)='-$.', 0x6e93ebbbcc0884f3, 0x0, &(0x7f0000664fc0)={0x0, 0x7, 0x802}) r1 = dup2(r0, r0) mq_timedreceive(r1, &(0x7f00006b0f7d)=""/131, 0x83, 0x0, &(0x7f0000ccf000)) r2 = gettid() r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) sendto(r3, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x2711, @my=0x0}, 0xfffffffffffffdcb) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000001c0)={0x80000000}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) kcmp(r2, r2, 0x7, r1, r1) [ 2263.946682] audit: type=1400 audit(2000001417.640:50073): avc: denied { map } for pid=32260 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000810000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2264.133723] audit: type=1400 audit(2000001417.810:50074): avc: denied { map } for pid=32335 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2264.156039] audit: type=1400 audit(2000001417.820:50075): avc: denied { map } for pid=32344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19, 0x0) [ 2264.178277] audit: type=1400 audit(2000001417.850:50076): avc: denied { map } for pid=32335 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2264.216734] audit: type=1400 audit(2000001418.010:50077): avc: denied { map } for pid=32428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a14ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10080, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x4, 0x4, [{0x5, 0x0, 0x2}, {0x661, 0x0, 0x2}, {0x6, 0x0, 0x615}, {0x0, 0x0, 0x8}]}) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:56:58 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xd6b, 0x100) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x5, 0x3d6, 0x8, 0x0, 0x16}) clone(0xf429363ed4517480, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() sched_setscheduler(r1, 0x3, &(0x7f0000000000)=0x3) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0xe62, 0x0, 0xff, 0x0, 0x4, 0x73b6}, 0xc71d, 0x200, 0x2}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0xfffffffffffffff9, 0xfff, 0xffffffff, 0x1, 0x1f, r1}) 03:56:58 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r1, 0x4b6c, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x28, 0x1, @scatter={0x9, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}, {&(0x7f0000000400)=""/216, 0xd8}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) 03:56:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fec00000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2264.401071] audit: type=1400 audit(2000001418.120:50078): avc: denied { map } for pid=32550 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2264.537840] audit: type=1400 audit(2000001418.120:50079): avc: denied { map } for pid=32550 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a15ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='-cgroup.#systemself\x00', 0xfffffffffffffffd) recvfrom(r1, &(0x7f0000000280)=""/251, 0xfb, 0x41, &(0x7f0000000380)=@nfc={0x27, 0x0, 0x2, 0x5}, 0x80) keyctl$link(0x8, r2, r3) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c01ac50000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:56:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1a, 0x0) [ 2264.702280] audit: type=1400 audit(2000001418.220:50080): avc: denied { map } for pid=32580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a16ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:56:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000e00000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2264.910464] net_ratelimit: 20 callbacks suppressed [ 2264.910472] protocol 88fb is buggy, dev hsr_slave_0 [ 2264.920634] protocol 88fb is buggy, dev hsr_slave_1 03:56:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x1, @local, 0x1ff}, @in6={0xa, 0x4e20, 0x5, @local}, @in6={0xa, 0x4e21, 0x7838000000, @empty, 0xb58}, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xd}, 0x6c}, @in6={0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3c8d}], 0x8c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ptrace$cont(0x7, r0, 0x0, 0x0) bind$ax25(r2, &(0x7f0000000240)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) 03:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a17ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2265.150453] protocol 88fb is buggy, dev hsr_slave_0 [ 2265.155726] protocol 88fb is buggy, dev hsr_slave_1 [ 2265.160480] protocol 88fb is buggy, dev hsr_slave_0 [ 2265.165830] protocol 88fb is buggy, dev hsr_slave_1 [ 2265.960485] protocol 88fb is buggy, dev hsr_slave_0 [ 2265.965612] protocol 88fb is buggy, dev hsr_slave_1 [ 2266.511438] protocol 88fb is buggy, dev hsr_slave_0 [ 2266.516580] protocol 88fb is buggy, dev hsr_slave_1 [ 2270.110530] net_ratelimit: 20 callbacks suppressed [ 2270.115522] protocol 88fb is buggy, dev hsr_slave_0 [ 2270.120620] protocol 88fb is buggy, dev hsr_slave_1 [ 2270.670542] protocol 88fb is buggy, dev hsr_slave_0 [ 2270.675655] protocol 88fb is buggy, dev hsr_slave_1 [ 2270.680741] protocol 88fb is buggy, dev hsr_slave_0 [ 2270.685763] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.150516] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.155808] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.390500] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.390505] protocol 88fb is buggy, dev hsr_slave_0 03:57:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x40480) write$input_event(r1, &(0x7f0000000100)={{0x77359400}, 0x17, 0xb4, 0x200}, 0x18) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:57:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1b, 0x0) 03:57:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000f00000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a18ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000003, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x3d8, 0x0, 0x0, 0x218, 0x218, 0x218, 0x308, 0x308, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x101, 0xd87, 0xffffffff}, {0x100000001, 0x3, 0xfffffffffffffffc}}}}, {{@ipv6={@empty, @mcast1, [0x0, 0xffffffff, 0xff, 0xffffffff], [0xff000000, 0xff000000, 0xff000000, 0xffffff00], 'team_slave_0\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x7, 0x7, 0x4d}, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0xab}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3f, 0x6, 0x7}, {0x6, 0x10000, 0x6}, {0x100000000, 0x7fffffff, 0x5}, 0x1, 0x4}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xc}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:08 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r1, 0x4b6c, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x28, 0x1, @scatter={0x9, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}, {&(0x7f0000000400)=""/216, 0xd8}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) 03:57:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x6, &(0x7f0000ffe000/0x2000)=nil, 0x2) truncate(&(0x7f0000000140)='./file0\x00', 0x3f) tkill(r0, 0x38) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x125002, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2274.680427] kauditd_printk_skb: 36 callbacks suppressed [ 2274.680440] audit: type=1400 audit(2000001428.470:50117): avc: denied { map } for pid=474 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2274.725733] IPVS: ftp: loaded support on port[0] = 21 03:57:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a19ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2274.801564] audit: type=1400 audit(2000001428.510:50118): avc: denied { map } for pid=474 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fc0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2274.999548] audit: type=1400 audit(2000001428.570:50119): avc: denied { map } for pid=502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.021714] audit: type=1400 audit(2000001428.570:50120): avc: denied { map } for pid=502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.043770] audit: type=1400 audit(2000001428.780:50121): avc: denied { map } for pid=613 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.065906] audit: type=1400 audit(2000001428.810:50122): avc: denied { map } for pid=613 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1c, 0x0) [ 2275.089888] audit: type=1400 audit(2000001428.810:50123): avc: denied { map } for pid=613 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.113945] audit: type=1400 audit(2000001428.850:50124): avc: denied { map } for pid=650 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:08 executing program 3: inotify_init() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syncfs(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) sendmsg(r1, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x4000) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000240)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000001c0)=""/48, &(0x7f0000000200)=0x30) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x5) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mkdirat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x1ff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./bus\x00', 0x6, 0x2) sendfile(r3, r4, 0x0, 0x8000fffffffe) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) 03:57:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x5, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x20000000, 0xaa}) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)="542fc4c322f7c09f7b5b9c613fe859352c11aa0075466096778336115261dfafc04071add57d84d5a6e62d11644e282f55abfe32c70159e611") ptrace$cont(0x7, r0, 0x0, 0xfffffffffffffffb) 03:57:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000540)="794657d805dc1ff3d5123c123f3f9bb6700762672324fe167500447b96b31161ea0533455592") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = request_key(&(0x7f0000000580)='rxrpc\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)='TIPCv2\x00', 0xfffffffffffffffa) r3 = request_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f00000006c0)='eth\x00', 0xffffffffffffffff) keyctl$unlink(0x9, r2, r3) r4 = fcntl$dupfd(r1, 0x0, r1) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)={0x360, r5, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x70}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}]}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa674}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x164, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd494}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc61}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdab3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x630f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'irlan0\x00'}}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x705d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x453d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x360}, 0x1, 0x0, 0x0, 0x1}, 0x8000) read$rfkill(r4, &(0x7f0000000080), 0x8) [ 2275.200089] audit: type=1400 audit(2000001428.990:50125): avc: denied { map } for pid=692 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a1affff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:09 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c080fe0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2275.290331] audit: type=1400 audit(2000001429.040:50126): avc: denied { map } for pid=692 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2275.310456] net_ratelimit: 20 callbacks suppressed [ 2275.310465] protocol 88fb is buggy, dev hsr_slave_0 [ 2275.327737] protocol 88fb is buggy, dev hsr_slave_1 03:57:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x400000, 0x140) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)={0x0, 0x80000, 0xffffffffffffffff}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000840)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000800)={&(0x7f0000000400)={0x400, 0x31, 0x0, 0x70bd27, 0x25dfdbfb, {0x19}, [@generic="39b649dffa1d80b133cbf59244e316e0c763cc3039db1c0efcd8c0e2815045087b866ab7a75ae16a02d845c523761f4a3ebd4641e6192b5223d70c4b0110105b2fa64385414ea953af01314a97477bc89fc696107ded420d57fbab6b42e9030940b9ac3d2fecc06a0bd9fa9b3fb8eb86bd", @generic="2820b31d023bda839675b0c8239b02f41f635e067455e2e2ed439cdece7815e932f875e14e2401860ada1011b6e8ab38356dbe0212b4f3527edc4b88c431368d3b7c8f8bd8175f90141e16efc3b8c842e472825896f27ac5b7f3dece4307d065f7d66e0a754d1b654611f1cf9517290b929fcb4ed44faae829f2803e72d12771407fbf02e95ae92f0a8d86ad", @nested={0x114, 0x57, [@generic="012c329f4f405a9906e564577e608c74d136c06cf8ad2e9ffeb8b297f544c89e81ff7ef5d0f28991cafcbd146e0fecc5cb7ba87ddce2d10a20efa6a02ee10355b75b962fb20290868798e65140d6756c387aae99a30e35205c24f71f87b5dde8d2719618c8cd63b06cdcaa485dcb4bc253d16bca95873378b0239fa4ea2e559db93356b62175181986c9c54a8c18d8a30a1142ef9b10967a6fd04497579683b907abfb5db627b50c7725f08abb22cc8eda9068215f225a", @generic="9a04f6321d6bafa14d7365fd401a99e0ed127fedcb617b6b6464db7558a397b26742d4df83e60edcd22eb7d8d2e62db22d7fa7bf58438deed88b816130530c59f7fe4d1655d683657bf32cf864d907cd7756673cf520"]}, @nested={0x10, 0x8f, [@typed={0x8, 0x68, @fd=r2}, @typed={0x4, 0x58}]}, @typed={0x8, 0x3, @pid=r0}, @generic="0768694c6f81a51997850ccb08b01c908f6007da655a3840051b5f75c06922b79f944f371a57c7be144a351111e6caf0b60852ce755eca4ff1c7c13ba19fca43b1e5c8b99d5bd57318fa8d49233b528d0b8e61a6a6f75c1252ee5341eefcf1ae059d6fd4f23b64e55b96951c67ce937befde9072e77efc0ab806320da1012552169601003439fc3ef386d5cfad4ebe084233548b42d58f284991f9e10af1e9ede4e49f840a1b", @typed={0x14, 0x76, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, @typed={0x8, 0x42, @uid=r3}, @typed={0x8, 0x6f, @uid=r4}, @generic="413990895d0944a45ec611759d69dd3a1f8ee8b2a491a5e5a380b8881b5fe4c46d6bf0d07eaf1a77c2ccf2759d593bf648c2025254e6fc97f812809d3e7189883c8fa6d91e0ccf364ae4fef7bfe81787911de0011715dc2c2436fbdc8c8f47cd99da5dee64056a7dd3cb16f3fc35f9f6b4764f41364127b4ef6ffa829eeaec3019c38103cbef7b9907cb3b1360930977d2002041cfe6ac4327e2577038395d10771209230b1ea0f4e65cd0c7d458dc748caf1a86feff46cb0c5f78dabf91ada352c9cefa121a267fdf14b2e8b5ec47a30b99abfc300c252d515eea8d3b2a8a9983ab0974152a8de0b5f4d025873815e169f7005a87ab8dce"]}, 0x400}, 0x1, 0x0, 0x0, 0x40000}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$VHOST_SET_LOG_BASE(r5, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) ioctl$VIDIOC_QUERY_DV_TIMINGS(r6, 0x80845663, &(0x7f0000000140)) 03:57:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a1bffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1d, 0x0) 03:57:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a1cffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2275.550470] protocol 88fb is buggy, dev hsr_slave_0 [ 2275.555607] protocol 88fb is buggy, dev hsr_slave_1 [ 2275.561488] protocol 88fb is buggy, dev hsr_slave_0 [ 2275.566587] protocol 88fb is buggy, dev hsr_slave_1 03:57:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a1dffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x28}, 0x28) 03:57:09 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0c0fe0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="63b7099e6476f55e9b50e1f40c9b8ff2fbf9573bed975210bdd244f89df60682b4b7ed45bb9307bb7979660b202444343c492732c4681daaefba5a0f527497479cd7587554bb96d448d281f2e7fbcf02fb7d47cd3aa360735b263d8f52c0f92eb8473c3d8ea33d625f00e5d1e650d8acc0bb77ab9f2e794c38f429db3c0bf597f97d8ca53617329ec60a1b78088dfbf67938f33d3a29f06563458767ed5b1068b522fd6f91180ac13d464d765b711841595683b42d4d9c3c04f970c557256d15d32003afd964f1e513e08ce7601567bcc26ec5b820b61a692af69388711fe29412c296d24bda4fabe2692c3a", 0xec, 0x6}, {&(0x7f0000000240)="09f02d7fde54c68c007a714bb3099a615cb98113d56f561f3a59aeba1b481662cb089ed84511330f707cf51e665871df42dd690209f57e790372ecc7f2db6b71c58ce059f942cd0f01eb5cfd17b9fd0184f5dc615ee38044b7199719f60dad4df5de31f6b6", 0x65, 0x9}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESDEC=r1, @ANYBLOB="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"]) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a1effff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2276.350504] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.355671] protocol 88fb is buggy, dev hsr_slave_1 [ 2276.910456] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.915564] protocol 88fb is buggy, dev hsr_slave_1 [ 2280.510603] net_ratelimit: 20 callbacks suppressed [ 2280.515611] protocol 88fb is buggy, dev hsr_slave_0 [ 2280.520718] protocol 88fb is buggy, dev hsr_slave_1 [ 2281.070486] protocol 88fb is buggy, dev hsr_slave_0 [ 2281.075582] protocol 88fb is buggy, dev hsr_slave_1 [ 2281.080962] protocol 88fb is buggy, dev hsr_slave_0 [ 2281.085982] protocol 88fb is buggy, dev hsr_slave_1 [ 2281.550574] protocol 88fb is buggy, dev hsr_slave_0 [ 2281.555732] protocol 88fb is buggy, dev hsr_slave_1 [ 2281.790523] protocol 88fb is buggy, dev hsr_slave_0 [ 2281.790528] protocol 88fb is buggy, dev hsr_slave_0 03:57:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x250, 0x8, 0xf, 0xd12, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x3}, [@nested={0x17c, 0x91, [@generic="6c97bf0fa77c436b47cbb3216eaf7fee13a98160b35aa6adc9ccd80660a4a40a9e31224355788fba96ae64a22fc48a7e2e49ed7614720ae60d018686d2a7e2dd5e5fd847000805e587f9fb172c2b590341c834e42822c6b7da08851ff7db240decd4d43ee7fc4f44b8b74f594c85cc4aaf9c438dc9ddadb4cfc2574fd9aa3c86971d474d0e03ef798edf8f1453c5027e39d3b26ab942d6d0c13f83ce15323b57c49d2ee5", @typed={0xc, 0x8d, @u64=0xbcd}, @typed={0x8, 0x2f, @uid=r3}, @typed={0x10, 0x1b, @str='/dev/vhci\x00'}, @generic="ec740c3d9d2b6e2a9b02bee0da4ae46a8737f026d7f1b20d1e7992b4a499c88267e8bb6875085bf7a56b31f7f7e32bdd5b268483efa18259cd4af845a4d37d51aeb09471bf2fffe2fb156d8500fa28925d75b270a22d09", @generic="8d3720abae6332b60e885a9e29c91db044c1e5353c3aa9f01484110220d618628a593c5284d0ed42f0c4", @typed={0x4, 0x72}, @typed={0x10, 0x7a, @str='/dev/vhci\x00'}, @typed={0xc, 0x56, @u64=0xabf9}, @typed={0xc, 0x4, @u64}]}, @generic="f7cc43aa2ca9a5433eba4eb0db414960643f16ff58f3a72b3d10550e7cd6cab950e032e8aab86be4e87bd495c2538b7019148f3a7231a34d5db7bfb2ddcdd61b2434babc59af2c611eefa7ff3a6e616ef0bcd1cd9d3bf457231449229e64f7d882c509b6118408f87e052c915a668328abf3d4914025d52d0d659502873af436bdd30df3509b8ed8766362680391714e8b430ebbc7da57f9432c741d73b29ab7d4f32e1f6095235f95a49e03c02809b2a4e8c6628702492aaf727e46137a1f"]}, 0x250}, 0x1, 0x0, 0x0, 0x4}, 0x40000) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local, 0x741}, 0x1c) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f00000005c0), 0xff90) 03:57:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1e, 0x0) 03:57:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000ff0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a22ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0x25d}}], 0xf4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 03:57:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x4, 0x1, 0x4, 0x4, 0x0, 0xffffffffffffff80, 0x20, 0x0, 0x4, 0x6, 0x6, 0x2, 0x9, 0x800, 0x3f, 0x80, 0xffffffffffffffff, 0x6, 0x78b7, 0x20, 0x3bc8eddc, 0x100, 0x40, 0x8, 0x7ff, 0x2, 0x10001, 0x24, 0x100000000, 0x54b, 0x7e, 0x14d349cb, 0x5, 0x5087, 0x5a, 0x8000, 0x0, 0x40, 0x6, @perf_config_ext={0x6, 0x4}, 0x4044, 0x1, 0x7, 0x4, 0x7, 0x6, 0x7febf097}, r0, 0x9, r1, 0x1) 03:57:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000400300000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2285.538769] kauditd_printk_skb: 38 callbacks suppressed [ 2285.538783] audit: type=1400 audit(2000001439.330:50165): avc: denied { map } for pid=1165 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a25ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, "fc82212c857709033142281b0308089efcf7570ecccf4cea6aba1eadb2b21fb1a269c711c26ec10d7fad1af85c5a550d008d4a050c0ddc9ce455a27bb8379c8813b34e6337e157e2470fb55998af3d138ae8cc14866d955011dfa29c6648818ee4efeb0492247ada3db9e6504d20"}, 0x6f) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) [ 2285.642028] audit: type=1400 audit(2000001439.370:50166): avc: denied { map } for pid=1165 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) mq_open(&(0x7f0000000400)='/dev/vfio/vfio\x00', 0x40, 0x10, &(0x7f0000000440)={0x800, 0x7, 0x7, 0x9, 0xffffffffffff0001, 0x1, 0x1f, 0x1ff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f00000003c0)={0x18, 0x1, 0x0, {0x8}}, 0x18) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ptrace$getsig(0x4202, r5, 0xaf, &(0x7f0000000340)) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@rand_addr=0x1, 0x4e22, 0x50e, 0x4e21, 0x8, 0xa, 0x80, 0x20, 0x2b, r3, r4}, {0xfffffffffffffff8, 0x1, 0x3, 0x1, 0x5, 0x0, 0x7ff, 0x7f}, {0x2, 0x475e, 0x4, 0x638}, 0x6, 0x6e6bb3, 0x0, 0x1, 0x1, 0x2}, {{@in=@empty, 0x4d6, 0x3b}, 0xa, @in6=@loopback, 0x34ff, 0x3, 0x5d41b87cd385619a, 0x95, 0x9, 0x7}}, 0xe8) [ 2285.710468] net_ratelimit: 20 callbacks suppressed [ 2285.710477] protocol 88fb is buggy, dev hsr_slave_0 [ 2285.720583] protocol 88fb is buggy, dev hsr_slave_1 03:57:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000001000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2285.747334] audit: type=1400 audit(2000001439.380:50167): avc: denied { map } for pid=1165 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x21, 0x0) [ 2285.836998] audit: type=1400 audit(2000001439.390:50168): avc: denied { create } for pid=1170 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:57:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190aabffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000034000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2285.928996] audit: type=1400 audit(2000001439.540:50169): avc: denied { map } for pid=1233 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2285.951379] protocol 88fb is buggy, dev hsr_slave_0 [ 2285.956468] protocol 88fb is buggy, dev hsr_slave_1 [ 2285.960487] protocol 88fb is buggy, dev hsr_slave_0 [ 2285.966614] protocol 88fb is buggy, dev hsr_slave_1 03:57:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0x25d}}], 0xf4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 03:57:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190abcffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c06b6b6b00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2286.128579] audit: type=1400 audit(2000001439.570:50170): avc: denied { map } for pid=1235 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x22, 0x0) [ 2286.237054] audit: type=1400 audit(2000001439.580:50171): avc: denied { map } for pid=1235 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000000c0)={0x2, "03b76bbac857e08a70e21a34e34c243b8601cb4f050187d8b8acd31e616b82b4"}) 03:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a2093ff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2286.283497] audit: type=1400 audit(2000001439.720:50172): avc: denied { map } for pid=1344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.401554] audit: type=1400 audit(2000001439.750:50173): avc: denied { map } for pid=1344 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.487767] audit: type=1400 audit(2000001439.820:50174): avc: denied { map } for pid=1384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd07036848c3d0d864de937829517b8a7ce8d8f53bad8940d6eebf6c410651d5b648bed284b446c01ce4b51f01d27d4580e06c50b1b6c12667f10ae2e6302fd554d91dbcc53d78dea763261a063b5834808f5f1e2f900240537865cfdc6a3aeef9ed4cc5d18e931a859a209a1d9299003080ed60f1bf12eeabcb01967604e08a828869f8c29cd68e8d3c046d961a3ad5e3ddb8686d9fbfb78fc35f1b25768db3f89a1510e3ef52b37c241ec910000000000000000") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$llc_int(r2, 0x10c, 0x6, &(0x7f00000001c0)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, &(0x7f0000000300)=0x4) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f0000000080), 0x8) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x1873, 0x4) [ 2286.760525] protocol 88fb is buggy, dev hsr_slave_0 [ 2286.765684] protocol 88fb is buggy, dev hsr_slave_1 [ 2287.310504] protocol 88fb is buggy, dev hsr_slave_0 [ 2287.315650] protocol 88fb is buggy, dev hsr_slave_1 03:57:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) setpgid(r0, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000140)={{0x5, 0x7, 0x7, 0x1, 'syz1\x00', 0x4}, 0x1, [0x80, 0x2, 0x9, 0x8, 0x1, 0x2, 0x8000, 0x0, 0x8, 0x1ff, 0x3, 0x8, 0x5, 0x7ff, 0x5, 0xfffffffffffffffd, 0x3, 0x8, 0x35102a1c, 0x80000001, 0x4, 0x5, 0x10001, 0x1, 0xfffffffffffffffe, 0x7f, 0xdf2, 0x9, 0x7, 0x4, 0x200, 0x1, 0xeb, 0x2652, 0x1, 0x10001, 0xfffffffffffffff9, 0x1, 0x1, 0x6, 0x8, 0xea, 0x5, 0x5, 0x4, 0x944, 0x200, 0x1000, 0x0, 0xfffffffffffffffc, 0x8, 0x40, 0x6, 0x87d, 0x1, 0x8, 0x1, 0x0, 0x1, 0x2, 0x400, 0x9, 0x9, 0xce, 0x5, 0x1, 0x539e, 0x800, 0x1ff, 0x3, 0x9, 0x1f, 0x2, 0x7, 0x800, 0x4, 0x9, 0x20, 0x0, 0x8, 0x5, 0xffffffff, 0x67, 0x6, 0x4, 0x100000000, 0x3, 0x3335, 0xffffffffffffffff, 0x4, 0xe5e2, 0x391c, 0x1ff, 0xdbd7, 0x1, 0x800, 0x7, 0xfb, 0x9, 0x0, 0x1, 0xbc2, 0x20, 0x2, 0x1, 0x4, 0x100000001, 0x0, 0x1, 0x3, 0x2, 0x0, 0x6, 0x1, 0x10000, 0x0, 0x4, 0x1000, 0x6, 0x401, 0x3ff, 0xfff, 0x100, 0x6, 0x2, 0x100000001, 0xfffffffffffffffe, 0x2]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="4d000000fffffdfd0000000000000002"]}) 03:57:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fffff000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ff937fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x23, 0x0) 03:57:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7f93ffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000001000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2000000000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000007) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:22 executing program 3: unshare(0x400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0xf, 0x81, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 03:57:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000002000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fff93ff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2290.910510] net_ratelimit: 19 callbacks suppressed [ 2290.910516] protocol 88fb is buggy, dev hsr_slave_0 [ 2290.920737] protocol 88fb is buggy, dev hsr_slave_1 [ 2291.470488] protocol 88fb is buggy, dev hsr_slave_0 [ 2291.475597] protocol 88fb is buggy, dev hsr_slave_1 [ 2291.480746] protocol 88fb is buggy, dev hsr_slave_0 [ 2291.485781] protocol 88fb is buggy, dev hsr_slave_1 [ 2291.960466] protocol 88fb is buggy, dev hsr_slave_0 [ 2291.965600] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.176869] kauditd_printk_skb: 35 callbacks suppressed [ 2292.176884] audit: type=1400 audit(2000001445.970:50210): avc: denied { map } for pid=1976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.190464] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.205412] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.215234] audit: type=1400 audit(2000001445.970:50211): avc: denied { map } for pid=1976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.110513] net_ratelimit: 20 callbacks suppressed [ 2296.115530] protocol 88fb is buggy, dev hsr_slave_0 [ 2296.121259] protocol 88fb is buggy, dev hsr_slave_1 [ 2296.350509] protocol 88fb is buggy, dev hsr_slave_0 [ 2296.350514] protocol 88fb is buggy, dev hsr_slave_0 [ 2296.350570] protocol 88fb is buggy, dev hsr_slave_1 [ 2296.355650] protocol 88fb is buggy, dev hsr_slave_1 03:57:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, r3, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x653e}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x800) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:57:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffff935602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='squashfs\x00', 0x2806024, 0x0) 03:57:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x24, 0x0) 03:57:30 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x401, 0x20000000, 0xaa}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x10000, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x43, 0x4, 0x1}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e21, 0x35c8, @mcast2, 0xf91}}}, &(0x7f0000000240)=0x84) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2297.082722] audit: type=1400 audit(2000001450.880:50212): avc: denied { map } for pid=1986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000004000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5603113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2297.150513] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.155704] protocol 88fb is buggy, dev hsr_slave_1 [ 2297.206460] audit: type=1400 audit(2000001450.910:50213): avc: denied { map } for pid=1986 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2297.246170] audit: type=1400 audit(2000001450.910:50214): avc: denied { map } for pid=1992 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x25, 0x0) 03:57:31 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000005000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:31 executing program 3: inotify_init() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syncfs(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) sendmsg(r1, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x4000) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000240)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000001c0)=""/48, &(0x7f0000000200)=0x30) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x5) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0xf) open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./bus\x00', 0x6, 0x2) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) [ 2297.328446] audit: type=1400 audit(2000001450.930:50215): avc: denied { map } for pid=1992 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5604113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2297.360312] audit: type=1400 audit(2000001450.940:50216): avc: denied { map } for pid=1992 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2297.425467] audit: type=1400 audit(2000001450.940:50218): avc: denied { map } for pid=1992 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2297.510286] audit: type=1400 audit(2000001450.960:50219): avc: denied { map } for pid=1992 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2297.626367] audit: type=1400 audit(2000001450.940:50217): avc: denied { create } for pid=1985 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2297.658367] audit: type=1400 audit(2000001450.980:50220): avc: denied { write } for pid=1985 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2297.688599] audit: type=1400 audit(2000001450.980:50221): avc: denied { read } for pid=1985 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2297.712814] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.712866] protocol 88fb is buggy, dev hsr_slave_1 [ 2297.734041] audit: type=1400 audit(2000001451.090:50222): avc: denied { map } for pid=2115 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2301.310582] net_ratelimit: 19 callbacks suppressed [ 2301.310591] protocol 88fb is buggy, dev hsr_slave_0 [ 2301.320707] protocol 88fb is buggy, dev hsr_slave_1 [ 2301.870476] protocol 88fb is buggy, dev hsr_slave_0 [ 2301.875562] protocol 88fb is buggy, dev hsr_slave_1 [ 2301.880670] protocol 88fb is buggy, dev hsr_slave_0 [ 2301.885693] protocol 88fb is buggy, dev hsr_slave_1 [ 2302.350534] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.355681] protocol 88fb is buggy, dev hsr_slave_1 [ 2302.590489] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.590510] protocol 88fb is buggy, dev hsr_slave_0 [ 2306.510551] net_ratelimit: 20 callbacks suppressed [ 2306.510559] protocol 88fb is buggy, dev hsr_slave_0 [ 2306.520640] protocol 88fb is buggy, dev hsr_slave_1 [ 2306.750504] protocol 88fb is buggy, dev hsr_slave_0 [ 2306.750509] protocol 88fb is buggy, dev hsr_slave_0 [ 2306.750571] protocol 88fb is buggy, dev hsr_slave_1 [ 2306.755623] protocol 88fb is buggy, dev hsr_slave_1 03:57:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x8, 0x1, 0x1, 0x1, 0x0, 0xffffffffffff8516, 0x10, 0x4, 0xfffffffffffffdac, 0x808, 0x3, 0x7f, 0x10001, 0x10001, 0x200, 0xfffffffffffffe01, 0x22, 0x1, 0x7, 0x6, 0x7, 0x7fa, 0xe08, 0x80, 0x5, 0x5, 0x2, 0x34c6, 0x6, 0x80, 0x100, 0x3, 0xffffffffffffff5e, 0x1a, 0x4, 0x101, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x5, 0x2, 0x7, 0xffffffff, 0x9, 0x100000000}, 0x0, 0xb, r2, 0x8) r3 = fcntl$dupfd(r1, 0x3, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:57:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5609113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:41 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000006000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x26, 0x0) 03:57:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x4c00007e, &(0x7f00000013c0)={&(0x7f0000000100)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) 03:57:41 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2307.296977] kauditd_printk_skb: 17 callbacks suppressed [ 2307.296991] audit: type=1400 audit(2000001461.090:50240): avc: denied { map } for pid=2441 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff562c113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:41 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000008000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:41 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6, 0x810, r0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2307.424032] audit: type=1400 audit(2000001461.090:50241): avc: denied { map } for pid=2441 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x27, 0x0) [ 2307.547072] audit: type=1400 audit(2000001461.120:50242): avc: denied { create } for pid=2440 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2307.550513] protocol 88fb is buggy, dev hsr_slave_0 [ 2307.576409] protocol 88fb is buggy, dev hsr_slave_1 03:57:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x2, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001b40], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0xd, 0x0, 0x0, 'vlan0\x00', 'rose0\x00', 'irlan0\x00', 'vcan0\x00', @random="cef8d9c3f3fe", [], @link_local, [], 0x70, 0xa0, 0x118}, [@common=@STANDARD={'\x00', 0x8}]}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "e988403cc4711d70ace52c7fddfb4349aa5abd0aa9ff7d4745593677a53b3635845819432b6f90468104be0a11aa1a08e6f3db5b80488eb32c099800e229f555"}}}}]}]}, 0x220) 03:57:41 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="165aaab6f0fac6f1b49f93c3ca6394037a3166179ab7438fb3af68faed281e6192a24e33a4b3a6bf38050b0943c7568cbbdc5dae27fd39fd0c95095d3343d9bf7c08bc019c424a6c071e9021bac02284a54a1ff9da35ee0b6b1716e912ad286f52", @ANYRES16=r2, @ANYBLOB="24042cbd7000fedbdf2514000000980004002c000700080004000008000300090000000800040003000000080003000900000008000300080000002c00070008000304000900000008000300070000000800040000000000080001000b00000000000000000800030000000000080004000800000008000400ffff00000800040002000000080002001f000000080004000700"/166], 0xac}, 0x1, 0x0, 0x0, 0x2000c015}, 0x800) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) [ 2307.600528] audit: type=1400 audit(2000001461.120:50243): avc: denied { write } for pid=2440 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2307.751118] audit: type=1400 audit(2000001461.260:50244): avc: denied { map } for pid=2560 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2307.837608] audit: type=1400 audit(2000001461.260:50245): avc: denied { map } for pid=2560 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2307.867453] audit: type=1400 audit(2000001461.270:50246): avc: denied { map } for pid=2585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2307.946531] audit: type=1400 audit(2000001461.270:50247): avc: denied { map } for pid=2560 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2307.994374] audit: type=1400 audit(2000001461.290:50248): avc: denied { map } for pid=2560 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2308.019525] audit: type=1400 audit(2000001461.390:50249): avc: denied { map } for pid=2664 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2308.110500] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.115616] protocol 88fb is buggy, dev hsr_slave_1 [ 2311.710556] net_ratelimit: 20 callbacks suppressed [ 2311.715662] protocol 88fb is buggy, dev hsr_slave_0 [ 2311.720758] protocol 88fb is buggy, dev hsr_slave_1 [ 2312.270544] protocol 88fb is buggy, dev hsr_slave_0 [ 2312.275635] protocol 88fb is buggy, dev hsr_slave_1 [ 2312.280742] protocol 88fb is buggy, dev hsr_slave_0 [ 2312.285771] protocol 88fb is buggy, dev hsr_slave_1 [ 2312.750522] protocol 88fb is buggy, dev hsr_slave_0 [ 2312.755646] protocol 88fb is buggy, dev hsr_slave_1 [ 2312.990528] protocol 88fb is buggy, dev hsr_slave_0 [ 2312.990533] protocol 88fb is buggy, dev hsr_slave_0 [ 2316.910514] net_ratelimit: 20 callbacks suppressed [ 2316.915528] protocol 88fb is buggy, dev hsr_slave_0 [ 2316.920639] protocol 88fb is buggy, dev hsr_slave_1 [ 2317.150513] protocol 88fb is buggy, dev hsr_slave_0 [ 2317.150517] protocol 88fb is buggy, dev hsr_slave_0 [ 2317.150579] protocol 88fb is buggy, dev hsr_slave_1 [ 2317.155660] protocol 88fb is buggy, dev hsr_slave_1 03:57:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x244) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x12, r0, 0x0) read$rfkill(r2, &(0x7f0000000080), 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VT_RELDISP(r3, 0x5605) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x16, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x4, 'ovf\x00', 0x8, 0x1a, 0x2c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 0x100000000, 0x1, 0x7}}, 0x44) 03:57:51 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000009000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff560fff3b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:51 executing program 3: inotify_init() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/loop-control\x00', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syncfs(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000240)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000001c0)=""/48, &(0x7f0000000200)=0x30) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x5) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0xf) r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./bus\x00', 0x6, 0x2) sendfile(r3, r5, 0x0, 0x8000fffffffe) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) 03:57:51 executing program 2: clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x28, 0x0) 03:57:51 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000a000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:51 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000040)=0x6) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2317.554784] kauditd_printk_skb: 25 callbacks suppressed [ 2317.554797] audit: type=1400 audit(2000001471.350:50275): avc: denied { map } for pid=2795 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850fffe0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2317.635020] audit: type=1400 audit(2000001471.380:50276): avc: denied { map } for pid=2795 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2317.698327] audit: type=1400 audit(2000001471.380:50277): avc: denied { map } for pid=2795 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x29, 0x0) 03:57:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x9, 0x0, 0x8, 0x2}) [ 2317.728530] audit: type=1400 audit(2000001471.400:50278): avc: denied { map } for pid=2794 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2317.755633] audit: type=1400 audit(2000001471.400:50279): avc: denied { map } for pid=2795 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1d60974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2317.788502] audit: type=1400 audit(2000001471.410:50280): avc: denied { map } for pid=2794 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2317.818484] audit: type=1400 audit(2000001471.410:50281): avc: denied { map } for pid=2795 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2317.843761] audit: type=1400 audit(2000001471.410:50282): avc: denied { map } for pid=2794 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:51 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000b000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00\x93\x80\x19\xbd8\x00\xdd\xeaJ\x81\xdf\x95\xf7\x90\x9b\xad\x97\x1c9`\x19\x81\ne}\xf6\xb6,\x9eK\xe3\"\"\xd2\x9e\xb9\xf3\x95\x19\xda\x0fu\x9c\xc0\x1d\xfa\xed5\xdc\x93i', 0x1e) sendto$inet(r0, 0x0, 0x2000000000000, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) [ 2317.950338] audit: type=1400 audit(2000001471.420:50283): avc: denied { map } for pid=2799 comm="syz-executor.4" path="socket:[249423]" dev="sockfs" ino=249423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 [ 2317.950490] protocol 88fb is buggy, dev hsr_slave_0 [ 2317.977772] protocol 88fb is buggy, dev hsr_slave_1 03:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0970f81000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:51 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x6, 0x2, 0x1, 0x82c24d9, 0x0, 0x0, 0xd0060, 0x8, 0x7, 0x8, 0x10001, 0x7, 0x8000000000, 0xae5, 0x8, 0x0, 0x50, 0xe7d9, 0x3, 0x2, 0x45, 0x0, 0x7fffffff, 0xfffffffffffffffb, 0x7, 0x85, 0x0, 0x2, 0x5, 0x8, 0x4, 0x5f, 0x10000, 0x7, 0x8001, 0x1000, 0x0, 0x6, 0x0, @perf_config_ext={0xfffffffffffff57f, 0xfffffffffffffffb}, 0x1000, 0x3, 0xdeb, 0x5, 0x656, 0x3, 0x3}, 0xffffffffffffff9c, 0x8, 0xffffffffffffff9c, 0xb) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x6, 0x0, 0x2, 0xffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000240)={0xfffffffffffffc00, r3, 0x1, 0xfffffffffffffffd}) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xffffffffffffff00, 0x8, 0x1, 0x3f, 0x0, 0x3, 0x4, 0x4, 0x6, 0x9, 0x6, 0x0, 0x400, 0x5, 0x91, 0x4, 0xfffffffffffffffa, 0x9ecf, 0x0, 0x9, 0x80000000, 0x80000000000000, 0x7, 0x100, 0x409, 0x10000, 0xec66, 0x100, 0x0, 0x8, 0x5, 0x9c8, 0x6, 0x86ea, 0x39, 0x7fffffff, 0x0, 0xfffffffffffeffff, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x100, 0x9, 0x1, 0x0, 0xffffffff, 0x80, 0xe5}, r0, 0x1, r1, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000280)={0x0, @loopback, @multicast1}, &(0x7f00000002c0)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2318.074835] audit: type=1400 audit(2000001471.420:50284): avc: denied { map } for pid=2794 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2a, 0x0) 03:57:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097c081000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:57:52 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000c000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:57:52 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x41) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) sendmsg$can_raw(r1, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@can={{0x3, 0xd7, 0x7ff, 0x2}, 0x4, 0x1, 0x0, 0x0, "bb656791058d592e"}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 03:57:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0), 0x5) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) fstatfs(r0, &(0x7f0000000140)=""/134) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) 03:57:52 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000e000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2318.520483] protocol 88fb is buggy, dev hsr_slave_0 [ 2318.525688] protocol 88fb is buggy, dev hsr_slave_1 [ 2322.110552] net_ratelimit: 20 callbacks suppressed [ 2322.110559] protocol 88fb is buggy, dev hsr_slave_0 [ 2322.120662] protocol 88fb is buggy, dev hsr_slave_1 [ 2322.670470] protocol 88fb is buggy, dev hsr_slave_0 [ 2322.675572] protocol 88fb is buggy, dev hsr_slave_1 [ 2322.680673] protocol 88fb is buggy, dev hsr_slave_0 [ 2322.685691] protocol 88fb is buggy, dev hsr_slave_1 [ 2323.150522] protocol 88fb is buggy, dev hsr_slave_0 [ 2323.155631] protocol 88fb is buggy, dev hsr_slave_1 [ 2323.390516] protocol 88fb is buggy, dev hsr_slave_0 [ 2323.395611] protocol 88fb is buggy, dev hsr_slave_1 [ 2327.310515] net_ratelimit: 20 callbacks suppressed [ 2327.315675] protocol 88fb is buggy, dev hsr_slave_0 [ 2327.320762] protocol 88fb is buggy, dev hsr_slave_1 [ 2327.550557] protocol 88fb is buggy, dev hsr_slave_0 [ 2327.550562] protocol 88fb is buggy, dev hsr_slave_0 [ 2327.550643] protocol 88fb is buggy, dev hsr_slave_1 [ 2327.555700] protocol 88fb is buggy, dev hsr_slave_1 03:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x80) r3 = fcntl$dupfd(r1, 0x0, r1) fchmodat(r3, &(0x7f0000000100)='./file0\x00', 0x110) read$rfkill(r3, &(0x7f0000000080), 0x8) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000600)={0x76, 0x0, 0x5352}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @loopback, @multicast1}, &(0x7f0000000300)=0xc) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video1\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x19, 0x2, 0xfffffffffffffaf7, 0xfffffffffffffffc, 0x0, 0x9, 0xa000000000000000, {0x0, @in={{0x2, 0x4e21, @loopback}}, 0x1d26, 0xa00000000000, 0x40, 0x1ff, 0x3}}, &(0x7f0000000540)=0xb0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000580)={r6, 0x100}, &(0x7f00000005c0)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000500)={'team0\x00', r5}) accept4$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14, 0x80800) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@initdev, 0x0}, &(0x7f0000000700)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000740)={@initdev, @remote, 0x0}, &(0x7f0000000780)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000980)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x90004000}, 0xc, &(0x7f0000000940)={&(0x7f00000009c0)=ANY=[@ANYBLOB="5c010000", @ANYRES16=r4, @ANYBLOB="00022abd7000fedbdf010000000000000000", @ANYRES32=r5, @ANYBLOB="f80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400050000ae01040000000000070800000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="0823fdaf77702b27e1b439aae87e4dfc8da84d1858e40ac9b4a6881df9c6767042db8becb74cac02e60eb57c24315d74a0b2ace269ee658e4f5197161e06ba1e63c185f6433fd985e0c69661bb4ef961dcb6ce2e420324c8a8fc3971223d1e83b8998fb740f138794fdd1c4cc551b329a71d793ba00b74ab98e61354067323349bc28791a00613b72b4ae06384e4acde6ad06e3b8292", @ANYRES32=r9, @ANYBLOB="400002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10], 0x15c}, 0x1, 0x0, 0x0, 0x4000804}, 0x40000) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e22, 0x9, @rand_addr="1a47c22da0f1d748f0e149c64c1af0a4", 0x20000000000000}}, 0x0, 0x6, 0x0, "6c19da9439168cb94d0ec24cfc03f46c6e800b2aceb35ee1e47a8e6d808acdba265075d2acdb3c0397ec9224785454665b7cb4fce42550c4707c8f0aff89d296488aafe373e95b92f3b1d69ca382ec5b"}, 0xd8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x100, 0x0) 03:58:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x121001, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) 03:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000033c58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2b, 0x0) 03:58:02 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000f000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) r2 = memfd_create(&(0x7f0000000180)='dev ', 0x3) write(r2, &(0x7f00000011c0)="16", 0x1) sendfile(r1, r2, &(0x7f0000000000), 0xffff) syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c4c1585e5c2b71660f3a426306f5") clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 2328.350573] protocol 88fb is buggy, dev hsr_slave_0 [ 2328.355713] protocol 88fb is buggy, dev hsr_slave_1 03:58:02 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000010000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000009358a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2328.441559] kauditd_printk_skb: 42 callbacks suppressed [ 2328.441572] audit: type=1400 audit(2000001482.240:50327): avc: denied { map } for pid=3744 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0x7, r0, 0x0, &(0x7f0000000200)="edc410b11ac263daadd2db795be5aa8cae9a140c1a0754fd2ad453e274f5ba0dd2d1e5e0aa20ec81a13ceb5fb1954702e8d6ad6888e36761f1ab18c1e9954588c853a3b3955090f399f256da7906bfb7dcefd193c801cb627f0caa62fc77d20ea0e9003a7a8d3b0f5c8e7934991694899181746fe067401f3341644366650f4b5013d62220b47b40b365b8e74a9120cef49b56a5ae33b75d00") ptrace$cont(0xa, r0, 0xffffffffffffffff, 0x3) [ 2328.577801] audit: type=1400 audit(2000001482.240:50328): avc: denied { map } for pid=3744 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2c, 0x0) [ 2328.696322] audit: type=1400 audit(2000001482.370:50329): avc: denied { create } for pid=3806 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:02 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000003f000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x1, 0x1, 0x7, 0x2, 0x6}}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2328.808878] audit: type=1400 audit(2000001482.370:50330): avc: denied { write } for pid=3806 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2328.899129] audit: type=1400 audit(2000001482.370:50331): avc: denied { read } for pid=3806 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2328.910490] protocol 88fb is buggy, dev hsr_slave_0 [ 2328.928301] protocol 88fb is buggy, dev hsr_slave_1 [ 2328.974646] audit: type=1400 audit(2000001482.400:50332): avc: denied { map } for pid=3890 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2329.002543] audit: type=1400 audit(2000001482.430:50333): avc: denied { map } for pid=3895 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2329.044945] audit: type=1400 audit(2000001482.440:50334): avc: denied { map } for pid=3895 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2329.070801] audit: type=1400 audit(2000001482.440:50335): avc: denied { map } for pid=3895 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2329.101374] audit: type=1400 audit(2000001482.450:50336): avc: denied { map } for pid=3895 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2332.510553] net_ratelimit: 20 callbacks suppressed [ 2332.515663] protocol 88fb is buggy, dev hsr_slave_0 [ 2332.520768] protocol 88fb is buggy, dev hsr_slave_1 [ 2333.070543] protocol 88fb is buggy, dev hsr_slave_0 [ 2333.075650] protocol 88fb is buggy, dev hsr_slave_1 [ 2333.080806] protocol 88fb is buggy, dev hsr_slave_0 [ 2333.085851] protocol 88fb is buggy, dev hsr_slave_1 [ 2333.550549] protocol 88fb is buggy, dev hsr_slave_0 [ 2333.555742] protocol 88fb is buggy, dev hsr_slave_1 [ 2333.790486] protocol 88fb is buggy, dev hsr_slave_0 [ 2333.790490] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.710509] net_ratelimit: 20 callbacks suppressed [ 2337.710516] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.720596] protocol 88fb is buggy, dev hsr_slave_1 [ 2337.950551] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.950570] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.955676] protocol 88fb is buggy, dev hsr_slave_1 [ 2337.960692] protocol 88fb is buggy, dev hsr_slave_1 03:58:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x77, &(0x7f0000000040)=r2, 0x10) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:58:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2d, 0x0) 03:58:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000ab58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000346000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000140)="11d1f2cdff81af2f5810c79cb87e86a42b5bfd4ec24d6e308fa3ab0c2514e58a361c5440d6ae4adbcb4464241b09c5c6ddb309b33128e2a3f1d15a2deb06bf01914de2b835cdd97a352190527bddc08973fc285829d4633bca7d32ffa87f065e3e8c27f3d791b97cbdbcfdda1a33b17c035fae5c578ddb020c03ac00bdbfe424d4a17e353600219740fd923b4613d7a0511bd1899235321b8f6d6b8ec26642d4803914bef4134866e670", &(0x7f0000000040)=""/67}, 0x18) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) ptrace$peekuser(0x3, r2, 0x8) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x11}, 0x98) sendto$inet6(r0, &(0x7f0000000280)="fd", 0x1, 0x0, 0x0, 0x0) 03:58:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000347000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2338.685669] kauditd_printk_skb: 14 callbacks suppressed [ 2338.685683] audit: type=1400 audit(2000001492.480:50351): avc: denied { map } for pid=4085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881020000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700fff0ffff0403fffffff300000a0000000661"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x186}]}) 03:58:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4208, r0, 0x0, 0x4d) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2338.750481] protocol 88fb is buggy, dev hsr_slave_0 [ 2338.755683] protocol 88fb is buggy, dev hsr_slave_1 [ 2338.853559] audit: type=1400 audit(2000001492.510:50352): avc: denied { map } for pid=4085 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000060000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2e, 0x0) [ 2338.999690] audit: type=1400 audit(2000001492.520:50353): avc: denied { map } for pid=4085 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.150524] audit: type=1400 audit(2000001492.530:50354): avc: denied { map } for pid=4085 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.180269] audit: type=1400 audit(2000001492.540:50355): avc: denied { map } for pid=4085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.217426] audit: type=1400 audit(2000001492.540:50356): avc: denied { map } for pid=4085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.246048] audit: type=1400 audit(2000001492.560:50357): avc: denied { map } for pid=4091 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.272229] audit: type=1400 audit(2000001492.580:50358): avc: denied { map } for pid=4091 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.295717] audit: type=1400 audit(2000001492.580:50359): avc: denied { map } for pid=4091 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2339.320294] protocol 88fb is buggy, dev hsr_slave_0 [ 2339.320386] protocol 88fb is buggy, dev hsr_slave_1 [ 2339.332036] audit: type=1400 audit(2000001492.600:50360): avc: denied { map } for pid=4091 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2342.910599] net_ratelimit: 20 callbacks suppressed [ 2342.916375] protocol 88fb is buggy, dev hsr_slave_0 [ 2342.921519] protocol 88fb is buggy, dev hsr_slave_1 [ 2343.470556] protocol 88fb is buggy, dev hsr_slave_0 [ 2343.476528] protocol 88fb is buggy, dev hsr_slave_1 [ 2343.481931] protocol 88fb is buggy, dev hsr_slave_0 [ 2343.487795] protocol 88fb is buggy, dev hsr_slave_1 [ 2343.950591] protocol 88fb is buggy, dev hsr_slave_0 [ 2343.956059] protocol 88fb is buggy, dev hsr_slave_1 [ 2344.190547] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.190552] protocol 88fb is buggy, dev hsr_slave_0 [ 2348.110583] net_ratelimit: 20 callbacks suppressed [ 2348.115938] protocol 88fb is buggy, dev hsr_slave_0 [ 2348.121266] protocol 88fb is buggy, dev hsr_slave_1 [ 2348.350557] protocol 88fb is buggy, dev hsr_slave_0 [ 2348.350562] protocol 88fb is buggy, dev hsr_slave_0 [ 2348.350639] protocol 88fb is buggy, dev hsr_slave_1 [ 2348.355743] protocol 88fb is buggy, dev hsr_slave_1 03:58:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x50) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@buf={0xe, &(0x7f00000000c0)="706c19aeb7787c257150810af7f5"}) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x3}, 0x10) getsockopt$llc_int(r2, 0x10c, 0xf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:58:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x8000, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000005865000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881040000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:22 executing program 3: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0x25d}}], 0xf4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 03:58:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2f, 0x0) [ 2348.903802] kauditd_printk_skb: 20 callbacks suppressed [ 2348.903816] audit: type=1400 audit(2000001502.700:50381): avc: denied { map } for pid=4421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810a0000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0006b6b6b000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2348.985033] audit: type=1400 audit(2000001502.730:50382): avc: denied { map } for pid=4421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000002c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="9db940fcdd68cc2c034a8414fd5950c5b3c39988212c8c886e4c273dfb054c6684081d9d32f1418c459a4c6002c7ef41d036c33e2f33a503568c466901a886e2ca8f62641cb8aa097bb0170371c3580a", 0x50, 0x8001}], 0x200000, &(0x7f0000000300)=ANY=[@ANYBLOB="626172726965722c61707072616973655f747970653d696d617369672c736d61636b66737472616e736d7574653d76626c616e302c657569643e0000000000000000000000d9e6b0dffd5e28b4bc1d4e87f8cc9be4e5dc2ee73c65174fcc86d520eb7f98b635b66a43a6b086c98a200668e735071d308b80a51685a7c03b59922a43e60d0f2c6d9efa7152fedad84fc2527b155f9aac5d06983b1c673fd4f9e4224be3f532a3db", @ANYRESDEC=r1, @ANYBLOB='m@\x00']) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x30, 0x0) 03:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810e0000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700fff0ffff0403fffffff300000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x38e}]}) [ 2349.141381] audit: type=1400 audit(2000001502.740:50383): avc: denied { map } for pid=4421 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2349.166277] protocol 88fb is buggy, dev hsr_slave_0 [ 2349.166333] protocol 88fb is buggy, dev hsr_slave_1 03:58:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000100)="0adc1f6d1b870706c7f3c2bb42495b972f833df8769f5fabebb40a53adf984265c5357263d3ce31f66a2a62965123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) [ 2349.286346] audit: type=1400 audit(2000001502.880:50384): avc: denied { map } for pid=4606 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0xb, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4b, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000140)={0x7, 0x4}) ptrace$setsig(0x4203, r0, 0x9596, &(0x7f0000000000)={0x36, 0xbf90, 0x4}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000180)="9e1d3529b5708912e05d987f608c7464b3d61c3f2bbbdb098933b841af5988d7116f29a80093ce0a2f7e3d8a187d125519191870225947b58efcc0a7ca06fb496c22920d2c16281c0d7a1a39edeb16426c849c640f8d7ff845f2df8183afa9e4a1b5275f06b1d5cea495dde1048e12b5cbea56d53dfe866f79af14eaab9e07563afd16a3", 0x84, r1}, 0x68) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x3f, r0, 0x1, 0x3f) 03:58:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000081000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2349.390298] audit: type=1400 audit(2000001503.020:50385): avc: denied { map } for pid=4711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810f0000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x200080080000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x7f, 0x7, 0x20000001, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2349.529369] audit: type=1400 audit(2000001503.020:50386): avc: denied { map } for pid=4711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0ffffa888000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x31, 0x0) 03:58:23 executing program 3: [ 2349.710481] protocol 88fb is buggy, dev hsr_slave_0 [ 2349.715634] protocol 88fb is buggy, dev hsr_slave_1 [ 2349.748401] audit: type=1400 audit(2000001503.020:50387): avc: denied { map } for pid=4711 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881600000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) ioctl$FICLONE(r0, 0x40049409, r1) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000100)=""/229, &(0x7f0000000040)=0xe5) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x2000, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000240)) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:58:23 executing program 2: clone(0x801102009ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101002, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0x7ff}, 0x2) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x9, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x201) shutdown(r2, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 03:58:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0ffffff9e000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2349.950484] audit: type=1400 audit(2000001503.030:50388): avc: denied { map } for pid=4711 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x80) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000200)=""/178) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x88, r2, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2f}}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:23 executing program 3: [ 2350.079225] audit: type=1400 audit(2000001503.040:50389): avc: denied { map } for pid=4711 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881e00000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x32, 0x0) 03:58:24 executing program 3: 03:58:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000001ac5000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2350.234175] audit: type=1400 audit(2000001503.270:50390): avc: denied { map } for pid=4880 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:24 executing program 3: 03:58:24 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) prctl$PR_SET_DUMPABLE(0x4, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x62000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0x400) ioctl$RTC_WIE_ON(r1, 0x700f) 03:58:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000e0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2353.310556] net_ratelimit: 18 callbacks suppressed [ 2353.310562] protocol 88fb is buggy, dev hsr_slave_0 [ 2353.320656] protocol 88fb is buggy, dev hsr_slave_1 [ 2353.870537] protocol 88fb is buggy, dev hsr_slave_0 [ 2353.875726] protocol 88fb is buggy, dev hsr_slave_1 [ 2353.880862] protocol 88fb is buggy, dev hsr_slave_0 [ 2353.885922] protocol 88fb is buggy, dev hsr_slave_1 [ 2354.350500] protocol 88fb is buggy, dev hsr_slave_0 [ 2354.355666] protocol 88fb is buggy, dev hsr_slave_1 [ 2354.590501] protocol 88fb is buggy, dev hsr_slave_0 [ 2354.590505] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.510532] net_ratelimit: 20 callbacks suppressed [ 2358.515537] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.520640] protocol 88fb is buggy, dev hsr_slave_1 [ 2358.750511] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.750516] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.750572] protocol 88fb is buggy, dev hsr_slave_1 [ 2358.755659] protocol 88fb is buggy, dev hsr_slave_1 [ 2359.550608] protocol 88fb is buggy, dev hsr_slave_0 [ 2359.555729] protocol 88fb is buggy, dev hsr_slave_1 [ 2360.110467] protocol 88fb is buggy, dev hsr_slave_0 [ 2360.115605] protocol 88fb is buggy, dev hsr_slave_1 03:58:34 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capget(&(0x7f0000000000)={0x20084522, r0}, &(0x7f0000000040)={0x101, 0x20000000009, 0x4, 0x3, 0x20, 0x3}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/109) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'veth1_to_team\x00', {0x2, 0x4e22, @broadcast}}) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c00010025bd7000fddbdf251c000000", @ANYRES32=r3, @ANYBLOB="20009f000c000100aaaaaaaaaabb0000"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x33, 0x0) 03:58:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881f00000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:34 executing program 3: 03:58:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fffffff0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:34 executing program 3: 03:58:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='/dev/vhci\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0xffffffffffffffff, r0, 0x7ff, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40082) dup3(r1, r2, 0x80000) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(r3, 0x0, 0x40000001, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) setxattr$security_ima(&(0x7f0000001480)='./file0\x00', &(0x7f0000001540)='security.ima\x00', &(0x7f0000001500)=@sha1={0x1, "eaf28a2208865d1310aace00ffc370c1c98dcc8f"}, 0x15, 0x2) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0x400, 0x5, &(0x7f0000001400)=[{&(0x7f0000000200)="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", 0xfb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x1}, {&(0x7f0000001300)="f841da09eb587a6f00b2b3b0ffd321989916b9a18a217848ac57b948776abeea0197d00ca5226d9c6225a7ab584bcd9d0a9abbbfef5e3b057bf1bd2e66d76d819c9e9988619ce70d3586191b88f6438d93aa37a33b8a51e008bcecf67ead583a8847b871d4e51c2da8360e37df58d3567656", 0x72, 0x1f}, {&(0x7f0000001380)="ac7b8fbee5dd1e20827a7a5df21ea87ded85129a16939e1bf47e506cd0cd06b38431e990b987509ed92051f22561be5652940b3fcc", 0x35, 0xa4d}, {&(0x7f00000013c0)="e4c75b9a1d20fe1eec7d9438aeb30364", 0x10, 0x7}], 0x208000, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) [ 2360.436940] kauditd_printk_skb: 65 callbacks suppressed [ 2360.436955] audit: type=1400 audit(2000001514.230:50456): avc: denied { map } for pid=5324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881470300fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000fc000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2360.607092] audit: type=1400 audit(2000001514.280:50457): avc: denied { map } for pid=5324 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:34 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x100, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = gettid() wait4(0x0, 0x0, 0x41000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:58:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x34, 0x0) 03:58:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xff34) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x3, 0xc000, 0x80000003) [ 2360.660163] audit: type=1400 audit(2000001514.330:50459): avc: denied { map } for pid=5324 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.817192] audit: type=1400 audit(2000001514.330:50460): avc: denied { map } for pid=5324 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.873889] audit: type=1400 audit(2000001514.310:50458): avc: denied { map } for pid=5380 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.905154] audit: type=1400 audit(2000001514.340:50461): avc: denied { map } for pid=5380 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.938380] audit: type=1400 audit(2000001514.450:50462): avc: denied { map } for pid=5433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.961626] audit: type=1400 audit(2000001514.500:50463): avc: denied { map } for pid=5438 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2360.999125] audit: type=1400 audit(2000001514.560:50464): avc: denied { map } for pid=5442 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2361.037649] audit: type=1400 audit(2000001514.650:50465): avc: denied { map } for pid=5446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2363.710552] net_ratelimit: 20 callbacks suppressed [ 2363.715627] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.720775] protocol 88fb is buggy, dev hsr_slave_1 [ 2364.270521] protocol 88fb is buggy, dev hsr_slave_0 [ 2364.275641] protocol 88fb is buggy, dev hsr_slave_1 [ 2364.280707] protocol 88fb is buggy, dev hsr_slave_0 [ 2364.285733] protocol 88fb is buggy, dev hsr_slave_1 [ 2364.750554] protocol 88fb is buggy, dev hsr_slave_0 [ 2364.755704] protocol 88fb is buggy, dev hsr_slave_1 [ 2364.990512] protocol 88fb is buggy, dev hsr_slave_0 [ 2364.990517] protocol 88fb is buggy, dev hsr_slave_0 [ 2368.910532] net_ratelimit: 20 callbacks suppressed [ 2368.915541] protocol 88fb is buggy, dev hsr_slave_0 [ 2368.920682] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.150515] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.150520] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.150580] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.155680] protocol 88fb is buggy, dev hsr_slave_1 [ 2369.950585] protocol 88fb is buggy, dev hsr_slave_0 [ 2369.955748] protocol 88fb is buggy, dev hsr_slave_1 [ 2370.510602] protocol 88fb is buggy, dev hsr_slave_0 [ 2370.515741] protocol 88fb is buggy, dev hsr_slave_1 03:58:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2100000003000000000000e700000000040000cd6a24a37c8a0d766a303bc7148600"/47], 0x21) ioctl(r0, 0x400, &(0x7f0000000040)="0adc1f123c621e496a4d9a") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x9, 0x101000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getrlimit(0xf, &(0x7f0000000100)) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r4 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r4, &(0x7f0000000080), 0x8) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 03:58:44 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fffffffc000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000a00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:44 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioprio_get$pid(0x1, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) tkill(r0, 0x38) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200, 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x600, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xf7fffdfffffffffe, 0x7, 0xaa, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:44 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x5) execve(0x0, 0x0, &(0x7f00000004c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00']) writev(r1, &(0x7f0000000100), 0x100000000000005c) syz_execute_func(&(0x7f0000000000)="91cd8080100c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0f450fbd27a95ff965be3c3b6446ddcb01ef8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f5776c16161787896c401fe5ff6a9c1460000e1b1ac45e22c892a0f0000009f") munmap(&(0x7f000091b000/0x600000)=nil, 0x600000) 03:58:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x35, 0x0) 03:58:44 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000080fe000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2370.676275] kauditd_printk_skb: 6 callbacks suppressed [ 2370.676289] audit: type=1400 audit(2000001524.470:50472): avc: denied { map } for pid=5670 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000e00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0x25d}}], 0xf4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 2370.814585] audit: type=1400 audit(2000001524.510:50473): avc: denied { map } for pid=5668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2370.857298] audit: type=1400 audit(2000001524.540:50474): avc: denied { map } for pid=5668 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:44 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000c0fe000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2370.890990] audit: type=1400 audit(2000001524.600:50475): avc: denied { map } for pid=5770 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x36, 0x0) 03:58:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881c00e00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2370.989062] audit: type=1400 audit(2000001524.610:50476): avc: denied { map } for pid=5770 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.106972] audit: type=1400 audit(2000001524.610:50477): avc: denied { map } for pid=5770 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.184222] audit: type=1400 audit(2000001524.810:50478): avc: denied { map } for pid=5881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.221658] audit: type=1400 audit(2000001524.820:50479): avc: denied { map } for pid=5881 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.248597] audit: type=1400 audit(2000001524.820:50480): avc: denied { map } for pid=5881 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.274705] audit: type=1400 audit(2000001524.820:50481): avc: denied { map } for pid=5881 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2374.110558] net_ratelimit: 19 callbacks suppressed [ 2374.115613] protocol 88fb is buggy, dev hsr_slave_0 [ 2374.120763] protocol 88fb is buggy, dev hsr_slave_1 [ 2374.670512] protocol 88fb is buggy, dev hsr_slave_0 [ 2374.675617] protocol 88fb is buggy, dev hsr_slave_1 [ 2374.680725] protocol 88fb is buggy, dev hsr_slave_0 [ 2374.685746] protocol 88fb is buggy, dev hsr_slave_1 [ 2375.150509] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.155681] protocol 88fb is buggy, dev hsr_slave_1 [ 2375.390508] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.390529] protocol 88fb is buggy, dev hsr_slave_0 [ 2379.310474] net_ratelimit: 20 callbacks suppressed [ 2379.310481] protocol 88fb is buggy, dev hsr_slave_0 [ 2379.320560] protocol 88fb is buggy, dev hsr_slave_1 [ 2379.550509] protocol 88fb is buggy, dev hsr_slave_0 [ 2379.550514] protocol 88fb is buggy, dev hsr_slave_0 [ 2379.550569] protocol 88fb is buggy, dev hsr_slave_1 [ 2379.555642] protocol 88fb is buggy, dev hsr_slave_1 [ 2380.350554] protocol 88fb is buggy, dev hsr_slave_0 [ 2380.355657] protocol 88fb is buggy, dev hsr_slave_1 03:58:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x200) write$P9_RREAD(r1, &(0x7f0000000100)={0xc3, 0x75, 0x1, {0xb8, "9f6bc5ed350753e39c5cc9f07d8cacbfa6dd429449d34b19f2cf97ec97efdcdda113fb1863f4d4b7658a4e27c6a4806a52335cd910e0afc013c491ccf963d4d0839bdad9aa201db7dd4187a12cdc531c43f7c6b5889b8c5cc237e663507f961dfd425bbeb07e506fbf288164ef3ad05913c87d8c516e51838dc004ef2445dd155613ac2b08744e688c1578f12503be7940553601b5972274ce847aef38ce477d7a14e6894e012cf107ed37e224d347f66cca8543e06b874c"}}, 0xc3) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:58:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700fff0ffff0403fffffff300000a0000000661"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)={0x1, 0x0, [{0x186}]}) 03:58:54 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000ff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:58:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000f00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x37, 0x0) 03:58:54 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$peekuser(0x3, r0, 0x892) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881291b00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:54 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c088a8ffff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2380.898176] kauditd_printk_skb: 11 callbacks suppressed [ 2380.898190] audit: type=1400 audit(2000001534.690:50493): avc: denied { map } for pid=6101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2380.925845] protocol 88fb is buggy, dev hsr_slave_0 [ 2380.925894] protocol 88fb is buggy, dev hsr_slave_1 03:58:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748811b2900fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:58:54 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000f0ffff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2381.052851] audit: type=1400 audit(2000001534.730:50494): avc: denied { map } for pid=6101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:54 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x2}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020d0000020000000080000000000000"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956298fe40000000000ac1414bb0000000a6e000000000400000000000000000000000000000000000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 03:58:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x38, 0x0) [ 2381.146236] audit: type=1400 audit(2000001534.730:50495): avc: denied { map } for pid=6101 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.172642] audit: type=1400 audit(2000001534.750:50496): avc: denied { map } for pid=6101 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.199491] audit: type=1400 audit(2000001534.890:50497): avc: denied { map } for pid=6181 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.265794] audit: type=1400 audit(2000001534.890:50498): avc: denied { map } for pid=6181 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.305326] audit: type=1400 audit(2000001534.910:50499): avc: denied { map } for pid=6181 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.344507] audit: type=1400 audit(2000001534.910:50500): avc: denied { map } for pid=6181 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.369029] audit: type=1400 audit(2000001535.030:50501): avc: denied { map } for pid=6317 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2381.392150] audit: type=1400 audit(2000001535.030:50502): avc: denied { map } for pid=6317 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2384.510606] net_ratelimit: 20 callbacks suppressed [ 2384.515771] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.520902] protocol 88fb is buggy, dev hsr_slave_1 [ 2385.070480] protocol 88fb is buggy, dev hsr_slave_0 [ 2385.075725] protocol 88fb is buggy, dev hsr_slave_1 [ 2385.080866] protocol 88fb is buggy, dev hsr_slave_0 [ 2385.085892] protocol 88fb is buggy, dev hsr_slave_1 [ 2385.550547] protocol 88fb is buggy, dev hsr_slave_0 [ 2385.555874] protocol 88fb is buggy, dev hsr_slave_1 [ 2385.790500] protocol 88fb is buggy, dev hsr_slave_0 [ 2385.790509] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.710518] net_ratelimit: 20 callbacks suppressed [ 2389.715545] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.720633] protocol 88fb is buggy, dev hsr_slave_1 [ 2389.950497] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.950516] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.955595] protocol 88fb is buggy, dev hsr_slave_1 [ 2389.960653] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.750594] protocol 88fb is buggy, dev hsr_slave_0 [ 2390.755855] protocol 88fb is buggy, dev hsr_slave_1 03:59:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6005, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:59:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x39, 0x0) 03:59:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881034700fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:04 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c09effffff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006, 0x0, 0x0, 0xfffffffffffffffd}]}, 0x10) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaabaaaaaaaaaaaaaaa0086dd6050a09c00080000fe8000000000000000000000000000bbfe8000000000000000000000000000aacfb81afc622f5ccc"], 0x0) 03:59:04 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040), 0x4) 03:59:04 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0f0ffffff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881006000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2391.154088] kauditd_printk_skb: 6 callbacks suppressed [ 2391.154099] audit: type=1400 audit(2000001544.920:50509): avc: denied { map } for pid=6540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:05 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0fcffffff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3a, 0x0) 03:59:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810ec000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2391.279346] audit: type=1400 audit(2000001544.950:50510): avc: denied { map } for pid=6541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.310458] protocol 88fb is buggy, dev hsr_slave_0 [ 2391.315694] protocol 88fb is buggy, dev hsr_slave_1 [ 2391.415298] audit: type=1400 audit(2000001544.990:50511): avc: denied { map } for pid=6540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.458943] audit: type=1400 audit(2000001545.100:50512): avc: denied { map } for pid=6613 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.489339] audit: type=1400 audit(2000001545.100:50513): avc: denied { map } for pid=6613 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.513502] audit: type=1400 audit(2000001545.120:50514): avc: denied { map } for pid=6672 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.537012] audit: type=1400 audit(2000001545.120:50515): avc: denied { map } for pid=6672 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.562212] audit: type=1400 audit(2000001545.120:50516): avc: denied { map } for pid=6672 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.585545] audit: type=1400 audit(2000001545.120:50517): avc: denied { map } for pid=6672 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2391.610194] audit: type=1400 audit(2000001545.140:50518): avc: denied { map } for pid=6672 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2394.910518] net_ratelimit: 20 callbacks suppressed [ 2394.910525] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.920728] protocol 88fb is buggy, dev hsr_slave_1 [ 2395.470514] protocol 88fb is buggy, dev hsr_slave_0 [ 2395.475621] protocol 88fb is buggy, dev hsr_slave_1 [ 2395.480750] protocol 88fb is buggy, dev hsr_slave_0 [ 2395.485797] protocol 88fb is buggy, dev hsr_slave_1 [ 2395.950488] protocol 88fb is buggy, dev hsr_slave_0 [ 2395.955618] protocol 88fb is buggy, dev hsr_slave_1 [ 2396.190553] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.190559] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.110527] net_ratelimit: 20 callbacks suppressed [ 2400.115550] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.120727] protocol 88fb is buggy, dev hsr_slave_1 [ 2400.350488] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.350496] protocol 88fb is buggy, dev hsr_slave_0 [ 2400.350564] protocol 88fb is buggy, dev hsr_slave_1 [ 2400.355589] protocol 88fb is buggy, dev hsr_slave_1 [ 2401.150552] protocol 88fb is buggy, dev hsr_slave_0 [ 2401.155692] protocol 88fb is buggy, dev hsr_slave_1 03:59:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x1, @broadcast, 'veth0_to_bond\x00'}}, 0xfffffffffffffea9) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 03:59:15 executing program 3: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007fafb72d1cb2a4a28093025a000000a84309c026234d2500060008000800080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 03:59:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000020000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100e000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x3d, &(0x7f0000000000)={0x2c, 0xfffffffffffff001, 0xe834}) 03:59:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3b, 0x0) 03:59:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000030000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100f000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2401.365906] kauditd_printk_skb: 11 callbacks suppressed [ 2401.365917] audit: type=1400 audit(2000001555.160:50530): avc: denied { map } for pid=6879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SVE_GET_VL(0x33, 0x1b3f) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) migrate_pages(r0, 0x2bb8b244, &(0x7f0000000000), &(0x7f0000000040)=0x10000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) mq_timedreceive(r1, &(0x7f0000000000)=""/88, 0x58, 0x0, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0x1000) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) [ 2401.461258] audit: type=1400 audit(2000001555.230:50531): avc: denied { map } for pid=6899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.484194] audit: type=1400 audit(2000001555.230:50532): avc: denied { map } for pid=6899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 03:59:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000040000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2401.614688] audit: type=1400 audit(2000001555.330:50533): avc: denied { map } for pid=7029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.679672] audit: type=1400 audit(2000001555.330:50534): avc: denied { map } for pid=7029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.709561] audit: type=1400 audit(2000001555.330:50535): avc: denied { map } for pid=7029 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.733793] protocol 88fb is buggy, dev hsr_slave_0 [ 2401.733829] protocol 88fb is buggy, dev hsr_slave_1 [ 2401.743862] audit: type=1400 audit(2000001555.340:50536): avc: denied { map } for pid=7029 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.779743] audit: type=1400 audit(2000001555.360:50537): avc: denied { map } for pid=7029 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.808449] audit: type=1400 audit(2000001555.360:50538): avc: denied { map } for pid=7029 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.837032] audit: type=1400 audit(2000001555.390:50539): avc: denied { map } for pid=7100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2405.310569] net_ratelimit: 20 callbacks suppressed [ 2405.315580] protocol 88fb is buggy, dev hsr_slave_0 [ 2405.320714] protocol 88fb is buggy, dev hsr_slave_1 [ 2405.870539] protocol 88fb is buggy, dev hsr_slave_0 [ 2405.881434] protocol 88fb is buggy, dev hsr_slave_1 [ 2405.886555] protocol 88fb is buggy, dev hsr_slave_0 [ 2405.891609] protocol 88fb is buggy, dev hsr_slave_1 [ 2406.350526] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.355671] protocol 88fb is buggy, dev hsr_slave_1 [ 2406.590481] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.590520] protocol 88fb is buggy, dev hsr_slave_0 [ 2410.510555] net_ratelimit: 20 callbacks suppressed [ 2410.515573] protocol 88fb is buggy, dev hsr_slave_0 [ 2410.520667] protocol 88fb is buggy, dev hsr_slave_1 [ 2410.750503] protocol 88fb is buggy, dev hsr_slave_0 [ 2410.750508] protocol 88fb is buggy, dev hsr_slave_0 [ 2410.750592] protocol 88fb is buggy, dev hsr_slave_1 [ 2410.755628] protocol 88fb is buggy, dev hsr_slave_1 03:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x0) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x381001) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_elf32(r2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x923) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000b00)='wlan1nodev\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b80)=r3, 0x4) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f0000000080), 0x8) 03:59:25 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x900) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) 03:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810fff00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000050000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3d, 0x0) 03:59:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, &(0x7f0000001f37), 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 2411.550623] protocol 88fb is buggy, dev hsr_slave_0 [ 2411.555776] protocol 88fb is buggy, dev hsr_slave_1 03:59:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000060000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000001c0)=0x87) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x54ad, 0x1f, 0x201, 0xff, 0xffff, 0x1, 0x3ff, 0xc2bc, r1}, 0x20) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f00000003c0)={{0x8, 0x5}, 'port0\x00', 0x41, 0x0, 0x69e, 0x0, 0x2, 0x6, 0x20, 0x0, 0x2, 0x6}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x202400) r4 = dup3(r3, r0, 0x80000) write$P9_RREMOVE(r4, &(0x7f0000000240)={0x7, 0x7b, 0x2}, 0x7) write$vhci(r3, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) openat(r4, &(0x7f0000000100)='./file0\x00', 0x40000, 0x18) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) read$rfkill(r5, &(0x7f0000000080), 0x8) [ 2411.659504] kauditd_printk_skb: 7 callbacks suppressed [ 2411.659518] audit: type=1400 audit(2000001565.450:50547): avc: denied { map } for pid=7322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000fff58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xfffffffffffffec1) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r3) clone(0x40600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000340)={[], 0x800, 0x0, 0x6, 0x9, 0x80000001, r4}) ptrace$setopts(0x4206, r4, 0x1, 0x0) dup2(r1, r2) tkill(r4, 0x38) r5 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f00000003c0)={0x200, 0x8, 0x10000, 0x5, 0x1, 0xbe6}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r5, 0x10f, 0x83, &(0x7f0000000140), &(0x7f0000000180)=0x4) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r6 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) write$FUSE_LK(r5, &(0x7f00000001c0)={0x28, 0x0, 0x2, {{0x40, 0xfffffffffffffff7, 0x2, r4}}}, 0x28) getsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000080)={0x3, 'syz_tun\x00', 0x1}, 0x18) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 03:59:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3e, 0x0) 03:59:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000080000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2411.823620] audit: type=1400 audit(2000001565.490:50548): avc: denied { map } for pid=7322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2411.841251] IPVS: ftp: loaded support on port[0] = 21 03:59:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000200fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2411.961182] audit: type=1400 audit(2000001565.500:50549): avc: denied { map } for pid=7322 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x4, 0x2) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:59:25 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000090000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2412.066089] audit: type=1400 audit(2000001565.550:50550): avc: denied { map } for pid=7322 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.110483] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.115653] protocol 88fb is buggy, dev hsr_slave_1 03:59:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x41, 0x0) [ 2412.217951] audit: type=1400 audit(2000001565.570:50551): avc: denied { map } for pid=7455 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.361236] audit: type=1400 audit(2000001565.570:50552): avc: denied { map } for pid=7455 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x491}]}) 03:59:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000400fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000040)=""/28) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000080)={0x81, 0x165c00000000, 0x355, 0x54d161b8}) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000a0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2412.409340] audit: type=1400 audit(2000001565.610:50553): avc: denied { map } for pid=7455 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.436346] audit: type=1400 audit(2000001565.720:50554): avc: denied { map } for pid=7544 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000b0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000040)=0x10080) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000a00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2412.587679] audit: type=1400 audit(2000001565.730:50555): avc: denied { map } for pid=7549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x42, 0x0) [ 2412.736419] audit: type=1400 audit(2000001565.740:50556): avc: denied { map } for pid=7544 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2415.710536] net_ratelimit: 20 callbacks suppressed [ 2415.715535] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.720639] protocol 88fb is buggy, dev hsr_slave_1 [ 2416.270523] protocol 88fb is buggy, dev hsr_slave_0 [ 2416.275661] protocol 88fb is buggy, dev hsr_slave_1 [ 2416.280756] protocol 88fb is buggy, dev hsr_slave_0 [ 2416.285787] protocol 88fb is buggy, dev hsr_slave_1 [ 2416.750501] protocol 88fb is buggy, dev hsr_slave_0 [ 2416.755634] protocol 88fb is buggy, dev hsr_slave_1 [ 2416.990533] protocol 88fb is buggy, dev hsr_slave_0 [ 2416.990580] protocol 88fb is buggy, dev hsr_slave_1 [ 2420.910504] net_ratelimit: 19 callbacks suppressed [ 2420.910512] protocol 88fb is buggy, dev hsr_slave_0 [ 2420.920580] protocol 88fb is buggy, dev hsr_slave_1 [ 2421.150536] protocol 88fb is buggy, dev hsr_slave_0 [ 2421.150541] protocol 88fb is buggy, dev hsr_slave_0 [ 2421.150598] protocol 88fb is buggy, dev hsr_slave_1 [ 2421.155630] protocol 88fb is buggy, dev hsr_slave_1 [ 2421.950541] protocol 88fb is buggy, dev hsr_slave_0 [ 2421.955669] protocol 88fb is buggy, dev hsr_slave_1 03:59:36 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="001000005d4ad29d05cde2fa08e3c88f4b799fd18fb7a959a4ef71360bf9965c274c3f880755d53931bef58ea94f5e571dcfe02fa2450c5d47937f8c95088fe8e65413de63dd080a9cb0e857bb097787c94c7f6c0fce64e3f7b133e5675889d87fe03ba24e793d99ccd4d7f637fe28fe234e4a6424105e42a5436043ef4e2cfccefece8f83b90399890baef035101698e3d105542f9cf98b88f8560b66e9a8d38e416ae3bf6d4663d47e30e41ecbbb1cad7be1eeefbe6921f6e7e401776f97ab07758723008226d1b3f9513f0cfafdb2821ae7b71fba8f86d86b1c96c495c52ac2009e39df7379b64ce0612f3e3bef238620f41361b147f29b5d3cc86e63e6dc00f25e01d336e1e564cf2eee85db2f7f4c572c0d1daad2c9004f2d206fba96f6e07bbf74133581f2e5e4edc461a01b4c7b5527916e79da4fbdf60bb1243860b81da26acddf7f99a605f0b8cec6786a38739d7f084c81813775be785c07b0ae6344ee789f61a23c2ebbd749a178f5cb55ff454f3392857ac9a3e3149d039215d2f9a3e29a520527ad774fd54ce01ba6ff0707415718580a970fddd64d09cf0bdefba62be45560302cf8b3ee014bb57ac1b1e15713cb68be7937b50af480bf453310b64a60bd5608bdf82c0590b711a27be7056b4018e620013e65292bd3e68ec639f6aa955d9d5120182003afbd4b03a47c13bae2cb2b974b0b511fb57acb959c729bfdbb6b3fbc095ae160ffbda0fefdc206bd2169ef6d3e739ea0c5d4f787f21c939d2d04ce220d15e1419e7f43955f0587a00e2c2fa4d5dfb2878856b6f556f4b5cc8bfbdc466a48f71f690e65a8a1846e3d4601b4ed0c78b850f0cc307d51b5bd42dd521e1e860457b88040d03ffadde3bf08570bfce11e2d0e559b0f51f2a13ece578967bfab889871beed61ea33a2dad385df5e626e41f7dc6a546f048d531ae5a4342162a748f83591578157d52a7a133ab3b94428dd2b985659d58dfaa1ed84a58d08028a4e0fab42f2a9be68815b1a6f701c99ad015970f5dfe30e7179b695eef91c80a90ded555f3be97f72983f4ad9315629da196e2c6999651e91e5e6f67950128e6bc93b363d8035e743175489ec79d461b3f13fe3d76f554b06724929bda390c12137c4deadbfd1aa090d034abde89454fb7931780534446e585fa4c18082a6e5f0b641e2c6c346d97b76e9c82d3c42cfe1c884c08eccf442a993e36f107ce39a52dca6a7d5ccfbb0caa8e1cb5f8725e71fd63278283bd6c720769c58d33dd8fde2c50cf16ff5b65bcd47c9d03dd064b67ca2934a96f64d1a07d50ca7b2047905685ff9c6a2e3bfa8772ad3233226b558d866c0553d4106e59bc4a21a74ddf0e8ff0027cd114b252a8c3ff121162b08d2a56d63acaed5087cb80c64f56d7498c910fdd6a5501186e21579ba0dad4604b38f87e43b5f2f47c77a19c3239f3a6283218d0770781f1327d0733dfac2e20e8cc621d42fb7fdc569f8f962b4464282925ae0f6d09ae912d0320bdd8a42a4c492ff8660f0b1934e97e300b799a85a3ab46c1c7ce100000000ea6c1a868cab1af1f142d5f65c9159e24c1774a4346df94c29c328847d2ecbf205b05104d900ea210df07d6b7bcd54eecc5d460fd02eaa32fd0017d1f76bd135cca816ab8502e1aedd944d944825ea0c50821454cb1917cefe74c2fc59fb9fef9e751253a967f1867d20afea92d361105d356cb07551453c5d2f1e41950d8100c27e83ab7180d9d1072d0e7c68209d18cccb0d48ab7debb35b3ede219a10bf3b1e92dfe9d5cbd7060a08d941fac0151336305e5f42cfa9abfc88bd7593e1861cf1f42cfed7597e8b604d265dca4dac0ec8bef7e387cbe499dad5cc162260bb2eeb5314d12562db3093b350ecaf7df78349e9a0cc835e246ea0ecdcc02c9b13c02f224a91cbff8414cddb48e67a9b6ec8ced16394d79f3a86ba2d78127792799cfaa1a1601e09cfac3d68a600f4d379d1654ed90fa869c10c58d2cf2a2a4c775efcd0a803f76482a5ab2f781c063cd929957069972d2be8d2641e7613588eff6683394b42910ee9f897833450c94e3e488381e523d08d01436323c784b68e842bb83f01cc389a38641290a8477d6bd5a2775fd757e9497dbc96131f7d721e7c6a60959c4b180f346756ee887518e72bc7102b3a91ee4ed03f6604ce7c24b9698d3d0a539186f8288112bcddfab699c622e0940fa1dcc7427e8b881a37a9ef78394db9e00e0f8f9d89063d827aeb2bdc743a50498146bd2cec2e6959a1fd36600dfc04f64e138812b4f684283cef73628dd9f346eacc2d82a5a2d54cc0068ec23f3c0ccb2576e62b01a78f5d2f0f3dfb71965d55e8a2a19b298c343940e906a3acdd42d91cb36cfcc093b9c280be79e45a5eb469505e3119efc12810ae6d3d25c395b0f7f643481cda143915d3a5b1714c7df7de80b08a5a12bcbf08b27f944043f8d486be23bbae0e34e08f43510a7d5088fe4ed2fae2cd36652a619fb24ea1a24a8d0b5c5acbf85b50e4a868a35c2bcced74ea68642fde33dc19ebe270b7d7c93d237ee4f9dfd54d5f15ee615085cac7c3aabbc9e2cb3585b131fd7208389a89a064408021b69849ab99058258460844055b028b8cfa43f9c7e55f1c8bab66fb061a391f4c1dc437f508aa53611349973e5b64391ebc340e3cb3f9bb1d7690548206f11d444ab9e3f3c932160eb29c8afd33f053f05b7f05d773a58090cb6ce7c5aa2f7a4b7ed12fdddd20e8bee18aed957e0f5c7bd8db9cad707aef1bd139147da946344fe246e6ca0a0f8b49db06f494f844cf957eced7078d4b8d651e4e6ced1e57fd897f37987b63bffd86f866a691d2e42e28e5c707e1030aba8fc9687a21300245367c887965de4767db8b773713b4253887429d5c79c7f700f7a2c3af0638b67b774d2875b7116ab531ae005a4b22474e71fa233871279aa5f0d4b08206c476f3641b30471659787adeddda11e878bb29ca9f722f5ccb1777a1d5b068daa2a61a9bc0629ae7505a7704b672772641ac286e1d5c2a3bc485ce0dcba087a191ecea31463e46cb1aaeb055e39871e991a7cee486c9456b0d01dc0686ecea44dd42ffe28ee586435aee91ab6d3fa7370f2c7537776b0098367e1e1e1fee87f18ccc22e58e8dd121d5ac69637e5e1307c4931262d288e9bb17cb15190b1b4200601ebbb6c180756665bc5bca618fe4c94306fa9e25a9c4ccb4a3a80329a543e86bef989b24a55bc1a484c9337424c72e8a816077506b4aa1768cb4a5004f0de70bab6981a31db2958f9a9db268ef40a6e5b86706d160e435bfc4e94a71f1f92fd1e16b0a20095818006aecb06d253981559670d63151957278f92ac88080259ff3d416f4c2fac2130533bad4cda19dddc40a0b4a79f33eb3d333cb2fdc80af9ba425a507436bbc3f2a25d554d79263315c5bceb666cbf077c88cb6e8ef6c39d62911c8847dcf75de719059220ecbf2464769cefa2687ac6ca3767a3d116846c1712e7992fbaf60084389e03168b62ce256c5ebdf199dca841a91c9dff4d3e119f9e1d85d1bb57bb2ee2ed9c8b5961876f1b30f1636c657e90ce54d263649558ff8bd5179705486a2ed9d628a8e163bc1f8c86b7076c153cb3b93a09a6c88a17074bfd143be363655b101d690acf4e4062cda41e74f7a253fe01c00bb01d5dc5ffee242e63e6adc48f4bc4ae2b01783cc14000950d128ea5b23bafab518e7466a839bcded5faab774b9dfd5b640b793d9c52c5b58921e748a0b062a5d977ca8d69440815972efaa4f1d88647a2f36ccd2e2f3969f2b7bdce3d9cf15aa045a9928a850bfe9e6aee14aef436a94c20155b19253dc68f6ac2c40f6e8322ed377a594ec61048f5cc06ffdc71a7b31af888e876d999c96ef25eb248e1296abd1f057becf41f7311d5f68e433cbe6ad7765bc72c1c7c65e26612188b3ca3460b5a0dbf5b9f0969dfbbc0ab1d79d90ba66dd8064bb6ef5c9e470ecbc200bbc81781508c88e1aadf9fd47e22977a5f61ef9809065048721a3cba7f24d20c71be1abeff54424e7900267c5e18afc3ce7624be59e1f66f980678f023791ec9dc07387f400eebbac9b2ef62cea8fe0eced6ed9df16d1ebe4121d59aa4c2d006e85d5054d9f9e852eadff7644b40425a8b8934cd8238d8ffb4653ba57246a1306d3d56c29669db34efdb6a98394dc4ec57f83d03edceebf1827f13b7c215943190ceb14e8a14985a8489e63b9bf3174b0bdffd07154699ef8ab7d829b744330924a57b15e2333ac12a1e001ab65154a64666e3e3522b41a9df75dfd0ed73170e9b3d51ab03ce6848a4c442e9c4092190ded432ba7e6225e87ebbc25a828ad2851daa223ad9ff1933400f17844793046003d2537a5f75e8e79f9c696c7ccfcba4185eaf2da998a47dce43d58465ae17cfa90d078c365e6f833fec6c9bfaeed6f49621eaba07497ddb872f1bb16a4252e4e274e8ac3b5f9b7271c11ef49f7262280875af77a508a90bc27d05490fffe2fd7fe31caea53cb78c616fd7a9b8395202563b96829372170d1e184be979f19275de883edf0f57a9dbd9fcfdf93dfb897487a986b17a85f898d06869cf2f0da3918cf4da2a8c26676e101dabdd843cb379e0d547c7947e8a920521e6d2dea91cb940d798e7d31062743b2cc5bdd8f3fe55f0f6bc9d85eca04da87dd0cde58c674db7e76d76f62ce3960f242f05add367b4b3bc0bad03bd2846316487d95a5f0c8a4828a2ab1340c8b30caf01763690842ddac0f158f64c69f85aa1726feacffc7a0effd50ae4d5b520e3a0b9e79cf0eacb05b457153b91fd78ed1fa83d471858b0004c9fb2c053005d2825662a8d2c530ebcfa064928b441364201a59d1726fcb199f81da88e05411b15ff27847de20c54ab8a921c02f78b309c97dc25b2580d10888ae9f07499e1af1397187f5288bb6e7d17077eedfb12638eb95fcc923bfa584b7547881e893449caa5f30e920f149bfeed59b4246479424e0771f71dc6873f0325a2c9f07d7e3f0740c769198fe989e6a79a3f51be45525fa5b50f0bade0465e3dfa9a5c61de32bcbc35a2d389ce081c6935e78b9e77781ff55fbb08c51e6384b0c320f3adacb2fe099e3f1d8d68212fb34e94ee5e11f2c10cc9c7c79b36ca84beb4437437e6497e3a725fe301ce97b7609ae8c95d1e59e5268a7de0ce91b99f486ec577618a6c24bf6a2ac8199d766a227769b1e996406c4fa9bdcd919c66e1007465bf119bd0d2bb7e225ce2cb15104915c74132730f6efb839d2285a1b551b306d87a727abb2d0933d704994c93426344f149e26568de2f5882c1a57dade365b332de896d8434adadff4ef45402cdeafcec80c79506b6cffef30e74fc847f1b9bfef0ebf0eab215b12a206fd8ed6aa9b8464c077a8c57432a315aabf5c8122586a9870b8a1f4f4d9ef2fa852277ffe4ef7510550aae9b267b64a0872b4b0ce693b21df2fc8785cbc2d3f7bc4f0f48dc7857af7e4fb1d4e4dc7ce83a36a8f8c8ab11a550d25d1f96caa2cbb5f137b1315c3a2024858ec74ef867dc5a4f867f24d78105bcf31d7e142c384148735575aaf57282afa7bbd0ac98b489c4a3d5af0cdd8aba8a9ca2ff6db5e05e41bf6737d2597aa22919e682452b68e2596cda04e5540a9cf65366b018d3109e0d40a769b8c8426a67eb67dac5367aef6d494cdfd22605544a3f9d8e3449e5bf14b42aa7f9aeebf72fbfaf95ea3ac5263ba5fe0aeb938af1d1e2bb05ee546ce50ac9981f01279ee67c1c8d828e3b63823d70517854aa2cd02db68e137fc"], &(0x7f00000011c0)=0x1008) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001200)={r1, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x26}, 0x4}}, 0x7fffffff, 0x5, 0x1, 0xfffffffffffffff8, 0xa4}, 0x98) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x3, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) socket$inet(0x2, 0x80002, 0x20) write$vhci(r3, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r4 = fcntl$dupfd(r3, 0x0, r3) read$rfkill(r4, &(0x7f0000000080), 0x8) 03:59:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000e00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000c0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x400, 0x2000) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x3106, 0x9, 0x1, 0x2, 0x8, 0x8, 0x1e6, 0xff, 0x3f, 0x0, 0x9, 0xff, 0x6, 0x7, 0x4}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r2, 0x0, 0xfd3, r3) 03:59:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="0adc1f123c123f319bd070") getrusage(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x700, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) 03:59:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x43, 0x0) [ 2422.495801] kauditd_printk_skb: 43 callbacks suppressed [ 2422.495814] audit: type=1400 audit(2000001576.290:50600): avc: denied { map } for pid=8059 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2422.524276] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.529391] protocol 88fb is buggy, dev hsr_slave_1 03:59:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0xd33, @mcast1, 0x7}}, 0x1ff, 0xa1b0, 0x7fffffff, 0x4, 0x4}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1}, 0x8) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 03:59:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000f00fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2422.587534] audit: type=1400 audit(2000001576.340:50601): avc: denied { map } for pid=8059 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000e0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0x7fffffff, 0x7}, {0x3, 0x50a}, 0x4, 0x2, 0x3ff}) ioctl(r0, 0xa15, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) bind$isdn(r3, &(0x7f0000000040)={0x22, 0x6ca, 0x80, 0x6, 0x80000000}, 0x6) read$rfkill(r3, &(0x7f0000000080), 0x8) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000300)={@mcast1, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000440)={0x0, @multicast1, @initdev}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'veth1_to_team\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) accept4$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000580)=0x14, 0x80000) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e83572a5", @ANYRES16=r4, @ANYBLOB="08002dbd7000fcdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000001000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="800002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffff7f08000600", @ANYRES32=r9], 0xe8}}, 0x40) 03:59:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x44, 0x0) 03:59:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:36 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_phreshold\x00', 0x2, 0x0) [ 2422.754496] audit: type=1400 audit(2000001576.340:50602): avc: denied { map } for pid=8059 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000f0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881006000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2422.926695] audit: type=1400 audit(2000001576.450:50603): avc: denied { map } for pid=8182 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000080)=0x6) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x200000) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x7ff, 0xfffffffffffffffe, 0x2, 0x1, 0x4, 0x70000, 0xb9c, 0x7fff]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000100000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2423.035406] audit: type=1400 audit(2000001576.470:50604): avc: denied { map } for pid=8182 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100e000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:36 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrusage(0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) pipe(0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x400000000000018, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x61}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 03:59:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x45, 0x0) [ 2423.165533] audit: type=1400 audit(2000001576.480:50605): avc: denied { map } for pid=8182 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:37 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000600000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2423.297196] audit: type=1400 audit(2000001576.530:50606): avc: denied { map } for pid=8228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.399858] audit: type=1400 audit(2000001576.530:50607): avc: denied { map } for pid=8228 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.461937] audit: type=1400 audit(2000001576.550:50608): avc: denied { map } for pid=8228 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.496430] audit: type=1400 audit(2000001576.560:50609): avc: denied { map } for pid=8228 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2426.110547] net_ratelimit: 20 callbacks suppressed [ 2426.110553] protocol 88fb is buggy, dev hsr_slave_0 [ 2426.120616] protocol 88fb is buggy, dev hsr_slave_1 [ 2426.670494] protocol 88fb is buggy, dev hsr_slave_0 [ 2426.675583] protocol 88fb is buggy, dev hsr_slave_1 [ 2426.680711] protocol 88fb is buggy, dev hsr_slave_0 [ 2426.685737] protocol 88fb is buggy, dev hsr_slave_1 [ 2427.150539] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.155693] protocol 88fb is buggy, dev hsr_slave_1 [ 2427.390519] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.390524] protocol 88fb is buggy, dev hsr_slave_0 [ 2431.310544] net_ratelimit: 19 callbacks suppressed [ 2431.315556] protocol 88fb is buggy, dev hsr_slave_0 [ 2431.320654] protocol 88fb is buggy, dev hsr_slave_1 [ 2431.550544] protocol 88fb is buggy, dev hsr_slave_0 [ 2431.550548] protocol 88fb is buggy, dev hsr_slave_0 [ 2431.550608] protocol 88fb is buggy, dev hsr_slave_1 [ 2431.555705] protocol 88fb is buggy, dev hsr_slave_1 [ 2432.350554] protocol 88fb is buggy, dev hsr_slave_0 [ 2432.355688] protocol 88fb is buggy, dev hsr_slave_1 [ 2432.910511] protocol 88fb is buggy, dev hsr_slave_0 [ 2432.915590] protocol 88fb is buggy, dev hsr_slave_1 03:59:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="020789ae0200000071d21f6527b8d9cbe14a1ab806bf1326cccb000021645f2382739d7197c7158ba4750490220e3ea5ac8ce5cb972d80c527840700c80700b00d"], 0xfffffffffffffd70) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:59:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x46, 0x0) 03:59:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100f000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:47 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100042}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0xc00, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x10001, @bearer=@l2={'ib', 0x3a, 'caif0\x00'}}}}}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ptrace$peekuser(0x3, r0, 0x5) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000000)={0xa, 0x8, 0x64, 0x100000001}, 0xa) 03:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @empty}, {0x2, 0x0, @local}, 0x0, 0x0, 0x2, 0x46a}) 03:59:47 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000e00000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:47 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000f00000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2433.374440] kauditd_printk_skb: 28 callbacks suppressed [ 2433.374453] audit: type=1400 audit(2000001587.170:50638): avc: denied { map } for pid=8635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:47 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ptrace$setopts(0x4206, r0, 0x1000, 0x0) r1 = gettid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$nl_route(0x10, 0x3, 0x0) write(r3, &(0x7f0000001380)="fc0000003e00071fab162504090007000a050000000000000000e293210001c000000000000000000000bfff0000000000001ec28656aaa79bb94b46fe000000bc000200000300d633d45000000a366c57c6a55e00000100d07302ade0ddd5d7d5bbc91a3e2e80772c05dffd5a32e280fc83ab82f605f70cce190a608a47e988399ddef2fe082038f4f8b29d3597f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd25f386b4c3b0720e7bd0734babc7c737d67013375743417e583df0200000000000000a6b567b4cf715587e6d8a1ad0a4f0108a8835d731d05b0b3f0329fdcbb7b27057a2100"/252, 0xfc) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f0000000180)={0x7, 0xfff, 0x100000000, 'queue0\x00'}) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair(0x9, 0x803, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$IMCTRLREQ(r5, 0x80044945, &(0x7f0000000040)={0x401b, 0x1, 0x6, 0x9}) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:59:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881004703fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2433.479052] audit: type=1400 audit(2000001587.210:50639): avc: denied { map } for pid=8635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x1) write(0xffffffffffffffff, &(0x7f0000002000), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) 03:59:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x47, 0x0) [ 2433.561081] audit: type=1400 audit(2000001587.210:50640): avc: denied { map } for pid=8635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:47 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80040, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x20, &(0x7f0000000080)={0xffffffffffffff80}, 0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2433.602085] audit: type=1400 audit(2000001587.230:50641): avc: denied { map } for pid=8635 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.720144] audit: type=1400 audit(2000001587.290:50642): avc: denied { map } for pid=8731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.811822] audit: type=1400 audit(2000001587.300:50643): avc: denied { map } for pid=8731 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.876655] audit: type=1400 audit(2000001587.320:50644): avc: denied { map } for pid=8731 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.910228] audit: type=1400 audit(2000001587.320:50645): avc: denied { map } for pid=8731 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.937763] audit: type=1400 audit(2000001587.320:50646): avc: denied { map } for pid=8731 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.963896] audit: type=1400 audit(2000001587.330:50647): avc: denied { map } for pid=8731 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x31, 0x4, 0x0, {0x3, 0x3ff, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) 03:59:48 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000180)={{0x7fffffff, 0x9}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:59:48 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fc0000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000afe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x48, 0x0) 03:59:48 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x80, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000300)={"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"}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x80000000, 0x4, 0x80000001, 0x5]}) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff7, 0x40e440) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000200)=r3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x109000, 0x0) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000700)={0x100000001, 0x6, 0x0, 0x2, 0x9, 0x8}) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000140)=""/192) 03:59:48 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000300000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000efe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:48 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4207, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006008, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sync_file_range(r1, 0x0, 0x0, 0x2) 03:59:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100c00efe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:48 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000140)) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2436.510494] net_ratelimit: 20 callbacks suppressed [ 2436.510502] protocol 88fb is buggy, dev hsr_slave_0 [ 2436.520597] protocol 88fb is buggy, dev hsr_slave_1 [ 2437.070493] protocol 88fb is buggy, dev hsr_slave_0 [ 2437.075624] protocol 88fb is buggy, dev hsr_slave_1 [ 2437.080755] protocol 88fb is buggy, dev hsr_slave_0 [ 2437.085886] protocol 88fb is buggy, dev hsr_slave_1 [ 2437.550535] protocol 88fb is buggy, dev hsr_slave_0 [ 2437.555650] protocol 88fb is buggy, dev hsr_slave_1 [ 2437.790488] protocol 88fb is buggy, dev hsr_slave_0 [ 2437.790493] protocol 88fb is buggy, dev hsr_slave_0 [ 2441.710519] net_ratelimit: 20 callbacks suppressed [ 2441.715623] protocol 88fb is buggy, dev hsr_slave_0 [ 2441.720719] protocol 88fb is buggy, dev hsr_slave_1 [ 2441.950508] protocol 88fb is buggy, dev hsr_slave_0 [ 2441.950551] protocol 88fb is buggy, dev hsr_slave_1 [ 2441.955650] protocol 88fb is buggy, dev hsr_slave_1 [ 2442.750506] protocol 88fb is buggy, dev hsr_slave_0 [ 2442.755642] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.310493] protocol 88fb is buggy, dev hsr_slave_0 [ 2443.315604] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.320664] protocol 88fb is buggy, dev hsr_slave_0 03:59:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000460300000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 03:59:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x49, 0x0) 03:59:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000ffe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 03:59:58 executing program 3: ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 03:59:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/35) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:59:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000470300000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 03:59:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100291bfe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2444.907726] kauditd_printk_skb: 39 callbacks suppressed [ 2444.907740] audit: type=1400 audit(2000001598.700:50687): avc: denied { map } for pid=9411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20881, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x1, 0x1, [0x400, 0x3, 0x1, 0x7f, 0x7fff, 0x3, 0x0, 0x9]}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) dup(0xffffffffffffff9c) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7fff, 0x8200) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0x20000, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x20004000, 0x407ffffffffc, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000200)=0x6, 0x8) setfsgid(r3) ioctl$RTC_WIE_ON(r2, 0x700f) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2445.034154] audit: type=1400 audit(2000001598.810:50688): avc: denied { map } for pid=9472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:58 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x10000000, 0x0, 0x80) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgid(0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x0, 0x9, 0x0, 0x100000001}) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000100)={0x4000, 0x7000, 0xfff, 0x8000, 0x8}) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x1, 0x50}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x30], 0x8000, 0x82, 0xfff, 0x10000, 0x26}) r3 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0x0, 0x0, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0xda, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r1, 0x0) io_setup(0xfe, 0x0) dup2(r3, r1) memfd_create(&(0x7f0000000840)='\x00\x05\xdb\x1f]\x0f>\x04\xdb\xbf\x02\x04\x80\xff\xc5\xaf\xe4*\xa6\n\xc1\x05\xdc\x87\x1ct\xea\b\xa1!3\\\"\xed\x96F\xec\xdcd\xcan6\x15\xb3|\xbd\xe2\xc6\xf3\t\xf7\x89K\xc5AG\xf2\xc2]{\xd8\x02iD\xb0\xefXv\x92\xc1\xceg\a\"\x0f\xe0\"w`6\x89\xbd\x9cv', 0x3) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000540), 0x0) 03:59:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4a, 0x0) 03:59:58 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000500000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2445.134471] audit: type=1400 audit(2000001598.810:50689): avc: denied { map } for pid=9472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.187904] audit: type=1400 audit(2000001598.830:50690): avc: denied { map } for pid=9472 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881001b29fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2445.219471] audit: type=1400 audit(2000001598.840:50691): avc: denied { map } for pid=9472 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.252130] audit: type=1400 audit(2000001598.920:50692): avc: denied { map } for pid=9629 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.367621] audit: type=1400 audit(2000001598.920:50693): avc: denied { map } for pid=9629 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.417854] audit: type=1400 audit(2000001598.920:50694): avc: denied { map } for pid=9629 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.441230] audit: type=1400 audit(2000001598.920:50695): avc: denied { map } for pid=9629 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2445.469647] audit: type=1400 audit(2000001599.020:50696): avc: denied { map } for pid=9631 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2446.910498] net_ratelimit: 19 callbacks suppressed [ 2446.910505] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.920600] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.470494] protocol 88fb is buggy, dev hsr_slave_0 [ 2447.477618] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.482848] protocol 88fb is buggy, dev hsr_slave_0 [ 2447.487915] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.950495] protocol 88fb is buggy, dev hsr_slave_0 [ 2447.955779] protocol 88fb is buggy, dev hsr_slave_1 [ 2448.190462] protocol 88fb is buggy, dev hsr_slave_0 [ 2448.190468] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.110528] net_ratelimit: 20 callbacks suppressed [ 2452.110538] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.120683] protocol 88fb is buggy, dev hsr_slave_1 [ 2452.350540] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.350545] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.350642] protocol 88fb is buggy, dev hsr_slave_1 [ 2452.355648] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.150515] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.155666] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.710493] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.715634] protocol 88fb is buggy, dev hsr_slave_1 04:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 04:00:08 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000600000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4b, 0x0) 04:00:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000347fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f00000000c0)=',!\x00', 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x220300, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = fcntl$dupfd(r1, 0x406, r1) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, 0x0, 0xfffffffffffffede) fcntl$setstatus(r0, 0x4, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x3f) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) write$apparmor_exec(r2, &(0x7f0000000100)={'exec ', '/dev/loop#\x00'}, 0x10) setsockopt$inet6_buf(r3, 0x29, 0x2d, &(0x7f00000002c0)="3047807659f487fba63bf8b4015bc7db002bb5fb3ae2c795ad1a47350f8305032fa29deef8fe4d3f824cccb825e9dca84510e0017a7a99586150dd6ed0358e60ee72ea7beef6d5ed1ab1c8a2ae35075fe0a5d7d708756cd8901eb7c5b36d595aff5496", 0x63) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80004) 04:00:08 executing program 2: clone(0xc0042000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000140)=0x6, &(0x7f0000000180)=0x2) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000001c0)=""/248) recvfrom$x25(r1, &(0x7f00000002c0)=""/80, 0x50, 0xde36c2d7d6ebdae3, &(0x7f0000000340)={0x9, @remote={[], 0x0}}, 0x12) 04:00:09 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000900000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000060fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2455.151322] kauditd_printk_skb: 10 callbacks suppressed [ 2455.151334] audit: type=1400 audit(2000001608.940:50707): avc: denied { map } for pid=9852 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2455.257932] IPVS: ftp: loaded support on port[0] = 21 [ 2455.260445] audit: type=1400 audit(2000001608.950:50708): avc: denied { map } for pid=9852 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000ec0fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4c, 0x0) 04:00:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1, 0x0, 0x25d}}], 0xf4, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='sessionid\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 2455.370316] audit: type=1400 audit(2000001608.990:50709): avc: denied { create } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2455.404463] audit: type=1400 audit(2000001608.990:50710): avc: denied { write } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2455.429084] audit: type=1400 audit(2000001608.990:50711): avc: denied { read } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:09 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000a00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2455.472332] audit: type=1400 audit(2000001609.010:50712): avc: denied { create } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2455.588710] audit: type=1400 audit(2000001609.010:50713): avc: denied { write } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2455.675743] audit: type=1400 audit(2000001609.020:50714): avc: denied { read } for pid=9854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2455.715911] audit: type=1400 audit(2000001609.110:50715): avc: denied { map } for pid=9945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2455.745499] audit: type=1400 audit(2000001609.130:50716): avc: denied { map } for pid=9945 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2457.310472] net_ratelimit: 20 callbacks suppressed [ 2457.310478] protocol 88fb is buggy, dev hsr_slave_0 [ 2457.320561] protocol 88fb is buggy, dev hsr_slave_1 [ 2457.870638] protocol 88fb is buggy, dev hsr_slave_0 [ 2457.875725] protocol 88fb is buggy, dev hsr_slave_1 [ 2457.881060] protocol 88fb is buggy, dev hsr_slave_0 [ 2457.886099] protocol 88fb is buggy, dev hsr_slave_1 [ 2458.350540] protocol 88fb is buggy, dev hsr_slave_0 [ 2458.355690] protocol 88fb is buggy, dev hsr_slave_1 [ 2458.590523] protocol 88fb is buggy, dev hsr_slave_0 [ 2458.590551] protocol 88fb is buggy, dev hsr_slave_0 [ 2462.510542] net_ratelimit: 19 callbacks suppressed [ 2462.515541] protocol 88fb is buggy, dev hsr_slave_0 [ 2462.520602] protocol 88fb is buggy, dev hsr_slave_1 [ 2462.750511] protocol 88fb is buggy, dev hsr_slave_0 [ 2462.750544] protocol 88fb is buggy, dev hsr_slave_0 [ 2462.755644] protocol 88fb is buggy, dev hsr_slave_1 [ 2462.760668] protocol 88fb is buggy, dev hsr_slave_1 [ 2463.550637] protocol 88fb is buggy, dev hsr_slave_0 [ 2463.555793] protocol 88fb is buggy, dev hsr_slave_1 [ 2464.110507] protocol 88fb is buggy, dev hsr_slave_0 [ 2464.115748] protocol 88fb is buggy, dev hsr_slave_1 04:00:19 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x40000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)=0x9, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000040)=0x3) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:00:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000b00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000e0fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x7f, 0x40) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffe, 0x20000000, 0xaa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x10000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) 04:00:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4d, 0x0) 04:00:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:00:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000001, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r1, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2465.411943] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2465.429211] kauditd_printk_skb: 16 callbacks suppressed [ 2465.429225] audit: type=1400 audit(2000001619.220:50733): avc: denied { map } for pid=10319 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000f0fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000c00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2465.477530] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2465.519130] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2465.548458] audit: type=1400 audit(2000001619.260:50734): avc: denied { map } for pid=10325 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2465.568049] EXT4-fs error (device loop3): ext4_fill_super:4355: inode #2: comm syz-executor.3: iget: root inode unallocated [ 2465.662708] EXT4-fs (loop3): get root inode failed 04:00:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000ffffe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2465.683312] EXT4-fs (loop3): mount failed 04:00:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4e, 0x0) [ 2465.705312] audit: type=1400 audit(2000001619.260:50735): avc: denied { map } for pid=10325 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000e00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2465.889702] audit: type=1400 audit(2000001619.380:50736): avc: denied { map } for pid=10390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2465.988775] audit: type=1400 audit(2000001619.400:50737): avc: denied { map } for pid=10390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2466.017213] audit: type=1400 audit(2000001619.400:50738): avc: denied { map } for pid=10390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2466.043564] audit: type=1400 audit(2000001619.410:50739): avc: denied { map } for pid=10390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2466.068524] audit: type=1400 audit(2000001619.410:50740): avc: denied { map } for pid=10390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2466.092837] audit: type=1400 audit(2000001619.500:50741): avc: denied { map } for pid=10459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2466.115921] audit: type=1400 audit(2000001619.600:50742): avc: denied { map } for pid=10546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2467.710510] net_ratelimit: 20 callbacks suppressed [ 2467.710517] protocol 88fb is buggy, dev hsr_slave_0 [ 2467.720600] protocol 88fb is buggy, dev hsr_slave_1 [ 2468.270466] protocol 88fb is buggy, dev hsr_slave_0 [ 2468.275571] protocol 88fb is buggy, dev hsr_slave_1 [ 2468.280687] protocol 88fb is buggy, dev hsr_slave_0 [ 2468.285733] protocol 88fb is buggy, dev hsr_slave_1 [ 2468.750536] protocol 88fb is buggy, dev hsr_slave_0 [ 2468.755671] protocol 88fb is buggy, dev hsr_slave_1 [ 2468.990501] protocol 88fb is buggy, dev hsr_slave_0 [ 2468.990506] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.910571] net_ratelimit: 20 callbacks suppressed [ 2472.915578] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.920643] protocol 88fb is buggy, dev hsr_slave_1 [ 2473.150503] protocol 88fb is buggy, dev hsr_slave_0 [ 2473.150508] protocol 88fb is buggy, dev hsr_slave_0 [ 2473.150563] protocol 88fb is buggy, dev hsr_slave_1 [ 2473.155626] protocol 88fb is buggy, dev hsr_slave_1 [ 2473.950570] protocol 88fb is buggy, dev hsr_slave_0 [ 2473.955712] protocol 88fb is buggy, dev hsr_slave_1 [ 2474.510565] protocol 88fb is buggy, dev hsr_slave_0 [ 2474.515696] protocol 88fb is buggy, dev hsr_slave_1 04:00:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) 04:00:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4f, 0x0) 04:00:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000033c58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000f00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) fstatfs(r1, &(0x7f0000000680)=""/250) 04:00:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000100), 0x8) 04:00:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000009358a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2476.297205] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2476.316321] kauditd_printk_skb: 12 callbacks suppressed [ 2476.316335] audit: type=1400 audit(2000001630.110:50755): avc: denied { map } for pid=10671 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000c51a00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2476.367147] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 2476.410038] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 04:00:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, &(0x7f0000001b80)={0x77359400}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) [ 2476.449957] audit: type=1400 audit(2000001630.240:50756): avc: denied { map } for pid=10726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000ab58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000003f00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x50, 0x0) [ 2476.535326] EXT4-fs error (device loop3): ext4_fill_super:4355: inode #2: comm syz-executor.3: iget: root inode unallocated [ 2476.621011] audit: type=1400 audit(2000001630.280:50757): avc: denied { map } for pid=10726 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.622089] EXT4-fs (loop3): get root inode failed [ 2476.714027] audit: type=1400 audit(2000001630.300:50758): avc: denied { map } for pid=10752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.746385] EXT4-fs (loop3): mount failed [ 2476.790528] audit: type=1400 audit(2000001630.450:50759): avc: denied { map } for pid=10823 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.825078] audit: type=1400 audit(2000001630.450:50760): avc: denied { map } for pid=10823 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.857113] audit: type=1400 audit(2000001630.450:50761): avc: denied { map } for pid=10823 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.883117] audit: type=1400 audit(2000001630.570:50762): avc: denied { map } for pid=10889 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.913571] audit: type=1400 audit(2000001630.570:50763): avc: denied { map } for pid=10889 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2476.953808] audit: type=1400 audit(2000001630.590:50764): avc: denied { map } for pid=10895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:30 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x9ea}}, 0xa) [ 2478.110502] net_ratelimit: 20 callbacks suppressed [ 2478.110509] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.120740] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.670503] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.675595] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.680712] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.685766] protocol 88fb is buggy, dev hsr_slave_1 [ 2479.150512] protocol 88fb is buggy, dev hsr_slave_0 [ 2479.155661] protocol 88fb is buggy, dev hsr_slave_1 [ 2479.390469] protocol 88fb is buggy, dev hsr_slave_0 [ 2479.395555] protocol 88fb is buggy, dev hsr_slave_1 [ 2483.310520] net_ratelimit: 20 callbacks suppressed [ 2483.315629] protocol 88fb is buggy, dev hsr_slave_0 [ 2483.320729] protocol 88fb is buggy, dev hsr_slave_1 [ 2483.550530] protocol 88fb is buggy, dev hsr_slave_0 [ 2483.555621] protocol 88fb is buggy, dev hsr_slave_1 [ 2483.560478] protocol 88fb is buggy, dev hsr_slave_0 [ 2483.565676] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.350596] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.355775] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.910490] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.915578] protocol 88fb is buggy, dev hsr_slave_1 04:00:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000002fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) read$rfkill(r2, &(0x7f0000000080), 0x8) 04:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)='3', 0x1}], 0x1, 0x0, 0x0, 0x4008800}, 0x800) 04:00:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000034600000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r1, &(0x7f0000001080)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0) 04:00:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x51, 0x0) 04:00:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000004fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2487.143888] kauditd_printk_skb: 13 callbacks suppressed [ 2487.143901] audit: type=1400 audit(2000001640.940:50778): avc: denied { map } for pid=11211 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x7c) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020d0000100000000000000000000000080012000000030000000000000000000600"/55], 0x37}}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020620000200000000040018"], 0xc}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) writev(r2, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfb, 0x15, 0x0, 0x10001, "9ec543894b6a114ec34481d93a03351e"}, 0x15, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0xf, 0x2, {{0x8, 0x4, 0x4}, 0xfffffffffffffff7}}, 0x18) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8002200}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)={0x74, r3, 0xa20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2e30}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0xc0}, 0x4000040) pipe2$9p(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpriority(0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 04:00:41 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000034700000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2487.283129] audit: type=1400 audit(2000001641.070:50779): avc: denied { map } for pid=11351 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:41 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) exit(0x0) pread64(r0, 0x0, 0x374, 0x0) 04:00:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000afe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x52, 0x0) 04:00:41 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000655800000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2487.434776] audit: type=1400 audit(2000001641.080:50780): avc: denied { map } for pid=11352 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.525413] audit: type=1400 audit(2000001641.120:50781): avc: denied { map } for pid=11352 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.620794] audit: type=1400 audit(2000001641.120:50782): avc: denied { map } for pid=11352 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.653242] audit: type=1400 audit(2000001641.240:50783): avc: denied { map } for pid=11427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.682856] audit: type=1400 audit(2000001641.250:50784): avc: denied { map } for pid=11427 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.706726] audit: type=1400 audit(2000001641.260:50785): avc: denied { map } for pid=11429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.736073] audit: type=1400 audit(2000001641.310:50786): avc: denied { map } for pid=11433 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2487.759159] audit: type=1400 audit(2000001641.330:50787): avc: denied { map } for pid=11433 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2488.510547] net_ratelimit: 20 callbacks suppressed [ 2488.510556] protocol 88fb is buggy, dev hsr_slave_0 [ 2488.520706] protocol 88fb is buggy, dev hsr_slave_1 [ 2489.070523] protocol 88fb is buggy, dev hsr_slave_0 [ 2489.075688] protocol 88fb is buggy, dev hsr_slave_1 [ 2489.080822] protocol 88fb is buggy, dev hsr_slave_0 [ 2489.085858] protocol 88fb is buggy, dev hsr_slave_1 [ 2489.550525] protocol 88fb is buggy, dev hsr_slave_0 [ 2489.555673] protocol 88fb is buggy, dev hsr_slave_1 [ 2489.790500] protocol 88fb is buggy, dev hsr_slave_0 [ 2489.795586] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.710517] net_ratelimit: 20 callbacks suppressed [ 2493.715541] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.720655] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.950509] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.950525] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.955635] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.960662] protocol 88fb is buggy, dev hsr_slave_1 [ 2494.750586] protocol 88fb is buggy, dev hsr_slave_0 [ 2494.755748] protocol 88fb is buggy, dev hsr_slave_1 [ 2495.310509] protocol 88fb is buggy, dev hsr_slave_0 [ 2495.315596] protocol 88fb is buggy, dev hsr_slave_1 04:00:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x200000) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000100)={0xffff, 0x9, 0xfffffffffffffff8, 0x86}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$selinux_load(r1, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "f10a3d5556ac89f8d6239aa099f9a977c84c7afc238f5f569c892eb1b5958dbf13d79395b132de252431c48ce0cf036fecbb5c"}, 0x43) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x800246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) write$P9_RFLUSH(r3, &(0x7f0000000200)={0x7, 0x6d, 0x1}, 0x7) 04:00:51 executing program 3: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x61}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:00:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000000)=0x7fffffff) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000140)={0x53, 0xfffffffffffffffe, 0x6, 0x0, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) 04:00:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000efe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:51 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000006000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x53, 0x0) 04:00:51 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000586500000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:00:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000ffe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:00:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c1207849bd070") r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r1, &(0x7f00000000c0)=""/184, 0xb8, 0x0, 0x0) 04:00:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) [ 2497.476992] kauditd_printk_skb: 9 callbacks suppressed [ 2497.477006] audit: type=1400 audit(2000001651.270:50797): avc: denied { map } for pid=11592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x54, 0x0) 04:00:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000060fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2497.625529] audit: type=1400 audit(2000001651.270:50798): avc: denied { map } for pid=11592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.684813] audit: type=1400 audit(2000001651.280:50799): avc: denied { map } for pid=11592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.735490] audit: type=1400 audit(2000001651.310:50800): avc: denied { map } for pid=11667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.810599] audit: type=1400 audit(2000001651.340:50801): avc: denied { map } for pid=11667 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.836469] audit: type=1400 audit(2000001651.350:50802): avc: denied { map } for pid=11667 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.866406] audit: type=1400 audit(2000001651.360:50803): avc: denied { map } for pid=11667 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.892140] audit: type=1400 audit(2000001651.360:50804): avc: denied { map } for pid=11667 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.926341] audit: type=1400 audit(2000001651.430:50805): avc: denied { map } for pid=11779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2497.954867] audit: type=1400 audit(2000001651.460:50806): avc: denied { map } for pid=11778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2498.910521] net_ratelimit: 19 callbacks suppressed [ 2498.910527] protocol 88fb is buggy, dev hsr_slave_0 [ 2498.920620] protocol 88fb is buggy, dev hsr_slave_1 [ 2499.470488] protocol 88fb is buggy, dev hsr_slave_0 [ 2499.475609] protocol 88fb is buggy, dev hsr_slave_1 [ 2499.480769] protocol 88fb is buggy, dev hsr_slave_0 [ 2499.485866] protocol 88fb is buggy, dev hsr_slave_1 [ 2499.950500] protocol 88fb is buggy, dev hsr_slave_0 [ 2499.955624] protocol 88fb is buggy, dev hsr_slave_1 [ 2500.190455] protocol 88fb is buggy, dev hsr_slave_0 [ 2500.190460] protocol 88fb is buggy, dev hsr_slave_0 [ 2504.110517] net_ratelimit: 20 callbacks suppressed [ 2504.110525] protocol 88fb is buggy, dev hsr_slave_0 [ 2504.120642] protocol 88fb is buggy, dev hsr_slave_1 [ 2504.350494] protocol 88fb is buggy, dev hsr_slave_0 [ 2504.350500] protocol 88fb is buggy, dev hsr_slave_0 [ 2504.350593] protocol 88fb is buggy, dev hsr_slave_1 [ 2504.355612] protocol 88fb is buggy, dev hsr_slave_1 [ 2505.150572] protocol 88fb is buggy, dev hsr_slave_0 [ 2505.155722] protocol 88fb is buggy, dev hsr_slave_1 [ 2505.710519] protocol 88fb is buggy, dev hsr_slave_0 [ 2505.715615] protocol 88fb is buggy, dev hsr_slave_1 04:01:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept4$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x800) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:01:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fe8000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000540)={0xfffffffffffffd39, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001840)={0x51, 0x0, 0x2d, 0x1, @scatter={0x6, 0x0, &(0x7f0000001680)=[{0x0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {0x0}, {&(0x7f0000000400)=""/216, 0xd8}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08e990f9b506", 0x0, 0x8c, 0xfffffffffffffffe, 0x10002, 0x0}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x3000000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) unshare(0x40000000) 04:01:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000e0fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x55, 0x0) 04:01:01 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0xfffffffffffffe01) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x841, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000040)="90", 0x1}], 0x1, 0x0) 04:01:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de097488100000fff58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000008100000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2507.665489] kauditd_printk_skb: 9 callbacks suppressed [ 2507.665501] audit: type=1400 audit(2000001661.440:50816): avc: denied { map } for pid=12002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2507.756389] IPVS: ftp: loaded support on port[0] = 21 04:01:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)="f1616aaef93a7d1310d22535e6f7a2c123bb9db401aecd8d41da7a9314f492a7316d343d4790312dce4bea93f33e9584bbc8b68a41282b50685d155e6eb8d5c0d207d8e5c2364a09b4bf02900560d2f8bdb0e2c7b036c230b9aa"}}) 04:01:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de09748810000009358a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x56, 0x0) [ 2507.875332] audit: type=1400 audit(2000001661.590:50817): avc: denied { map } for pid=12199 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:01 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fec000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2507.975759] IPVS: ftp: loaded support on port[0] = 21 [ 2508.079246] audit: type=1400 audit(2000001661.590:50818): avc: denied { map } for pid=12199 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.102409] audit: type=1400 audit(2000001661.820:50819): avc: denied { map } for pid=12213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.130823] audit: type=1400 audit(2000001661.830:50820): avc: denied { map } for pid=12214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.154024] audit: type=1400 audit(2000001661.830:50821): avc: denied { map } for pid=12213 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.189215] audit: type=1400 audit(2000001661.880:50822): avc: denied { map } for pid=12213 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.232713] audit: type=1400 audit(2000001661.920:50823): avc: denied { map } for pid=12213 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.335925] audit: type=1400 audit(2000001662.040:50824): avc: denied { map } for pid=12222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2508.396038] audit: type=1400 audit(2000001662.090:50825): avc: denied { map } for pid=12222 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2509.310501] net_ratelimit: 20 callbacks suppressed [ 2509.310510] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.320618] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.870474] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.875573] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.880748] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.885922] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.350498] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.355630] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.590507] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.595622] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.510558] net_ratelimit: 20 callbacks suppressed [ 2514.515570] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.520629] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.750515] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.750519] protocol 88fb is buggy, dev hsr_slave_0 [ 2514.750609] protocol 88fb is buggy, dev hsr_slave_1 [ 2514.755615] protocol 88fb is buggy, dev hsr_slave_1 [ 2515.550631] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.555852] protocol 88fb is buggy, dev hsr_slave_1 [ 2516.110528] protocol 88fb is buggy, dev hsr_slave_0 [ 2516.115676] protocol 88fb is buggy, dev hsr_slave_1 04:01:11 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r3, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) fcntl$setstatus(r3, 0x4, 0x40000) r4 = fcntl$dupfd(r3, 0x0, r3) read$rfkill(r4, &(0x7f0000000080), 0x8) 04:01:11 executing program 2: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x61}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:01:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0001ac500000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000ab58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)="f1616aaef93a7d1310d22535e6f7a2c123bb9db401aecd8d41da7a9314f492a7316d343d4790312dce4bea93f33e9584bbc8b68a41282b50685d155e6eb8d5c0d207d8e5c2364a09b4bf02900560d2f8bdb0e2c7b036c230b9aa"}}) 04:01:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x57, 0x0) 04:01:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000e000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2234a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:11 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x916f133f5929a356) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$int_in(r3, 0x5452, &(0x7f00000003c0)=0x100000001) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @rand_addr, 0x8000000000000000}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, 0x0, 0x0) pause() ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000340)=@generic={0x1}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) r5 = getpgrp(0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000380)={0x1}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCNXCL(r3, 0x540d) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) rt_sigqueueinfo(r5, 0x19, &(0x7f0000000240)={0x16, 0x80, 0x7}) ftruncate(r6, 0x7fff) sendfile(r3, r6, 0x0, 0x8000fffffffe) 04:01:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)="f1616aaef93a7d1310d22535e6f7a2c123bb9db401aecd8d41da7a9314f492a7316d343d4790312dce4bea93f33e9584bbc8b68a41282b50685d155e6eb8d5c0d207d8e5c2364a09b4bf02900560d2f8bdb0e2c7b036c230b9aa"}}) [ 2517.914667] kauditd_printk_skb: 7 callbacks suppressed [ 2517.914680] audit: type=1400 audit(2000001671.710:50833): avc: denied { map } for pid=12439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.047855] audit: type=1400 audit(2000001671.750:50834): avc: denied { map } for pid=12439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x58, 0x0) 04:01:11 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x27, 0x0) [ 2518.171048] audit: type=1400 audit(2000001671.790:50835): avc: denied { map } for pid=12452 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.202754] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2518.276622] audit: type=1400 audit(2000001671.800:50836): avc: denied { map } for pid=12452 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.326119] audit: type=1400 audit(2000001671.810:50837): avc: denied { map } for pid=12452 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.364782] audit: type=1400 audit(2000001671.820:50838): avc: denied { map } for pid=12452 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.456062] audit: type=1400 audit(2000001671.820:50839): avc: denied { map } for pid=12452 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.493474] audit: type=1400 audit(2000001671.830:50840): avc: denied { map } for pid=12452 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.517967] audit: type=1400 audit(2000001671.840:50841): avc: denied { map } for pid=12452 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2518.549706] audit: type=1400 audit(2000001671.840:50842): avc: denied { map } for pid=12452 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2519.710534] net_ratelimit: 19 callbacks suppressed [ 2519.710540] protocol 88fb is buggy, dev hsr_slave_0 [ 2519.720954] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.270492] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.275649] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.281021] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.286058] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.760503] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.765629] protocol 88fb is buggy, dev hsr_slave_1 [ 2520.990486] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.990506] protocol 88fb is buggy, dev hsr_slave_0 [ 2524.910493] net_ratelimit: 20 callbacks suppressed [ 2524.910501] protocol 88fb is buggy, dev hsr_slave_0 [ 2524.920799] protocol 88fb is buggy, dev hsr_slave_1 [ 2525.150477] protocol 88fb is buggy, dev hsr_slave_0 [ 2525.150504] protocol 88fb is buggy, dev hsr_slave_0 [ 2525.155689] protocol 88fb is buggy, dev hsr_slave_1 [ 2525.160741] protocol 88fb is buggy, dev hsr_slave_1 [ 2525.950482] protocol 88fb is buggy, dev hsr_slave_0 [ 2525.955705] protocol 88fb is buggy, dev hsr_slave_1 [ 2526.510595] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.515716] protocol 88fb is buggy, dev hsr_slave_1 04:01:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x4, 0x10000) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000200)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x40080, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000240)={0x73e8ff03, 0x400000000000000, 0x7ff, 0x1000}, 0x14) write$smack_current(r3, &(0x7f0000000140)='\x00', 0x1) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f0000000080), 0x8) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000180)={0x1000000000000, 0x0, 0x10000}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) set_thread_area(&(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x4000, 0x6, 0x7, 0x2594, 0x401, 0x4, 0x100, 0x4}) set_robust_list(&(0x7f0000000340)={&(0x7f0000000300)={&(0x7f00000002c0)}, 0x7}, 0x18) 04:01:21 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000f000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/145, 0x91, 0x3) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) getcwd(0x0, 0x3eb196a6768afabb) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') lsetxattr$security_capability(0x0, 0x0, 0x0, 0xffffffffffffff6d, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000020000000000fba5e38bf6bb3306e7edc9c13ae41464fda1d743e66ba82db36e0beffdb00000000000030000220000000000000000"]) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x7ffd) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) fstat(0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00', 0x40000000001400) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendmmsg(r1, 0x0, 0xbc6f646dbde15292, 0x0) 04:01:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x59, 0x0) 04:01:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a23e4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:21 executing program 2: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x48201) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000500)='./bus\x00', 0x200) sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 04:01:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2b04a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:21 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000fc00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2528.110988] kauditd_printk_skb: 19 callbacks suppressed [ 2528.111000] audit: type=1400 audit(2000001681.900:50862): avc: denied { create } for pid=12774 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:01:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2b44a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5a, 0x0) [ 2528.194848] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000020) [ 2528.231152] FAT-fs (loop2): Filesystem has been set read-only 04:01:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00080fe00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2528.269544] audit: type=1400 audit(2000001681.910:50863): avc: denied { map } for pid=12785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2528.323044] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000202) [ 2528.359903] audit: type=1400 audit(2000001681.960:50864): avc: denied { write } for pid=12774 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2528.416177] audit: type=1400 audit(2000001682.000:50865): avc: denied { map } for pid=12786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000c0fe00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2528.452160] audit: type=1400 audit(2000001682.000:50866): avc: denied { map } for pid=12786 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2528.528600] audit: type=1400 audit(2000001682.010:50867): avc: denied { map } for pid=12910 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2528.551993] audit: type=1400 audit(2000001682.020:50868): avc: denied { read } for pid=12774 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2528.579152] audit: type=1400 audit(2000001682.100:50869): avc: denied { map } for pid=12967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2528.617339] audit: type=1400 audit(2000001682.140:50870): avc: denied { map } for pid=12990 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2528.653483] audit: type=1400 audit(2000001682.140:50871): avc: denied { map } for pid=12990 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2530.110572] net_ratelimit: 20 callbacks suppressed [ 2530.115589] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.120763] protocol 88fb is buggy, dev hsr_slave_1 [ 2530.670463] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.675572] protocol 88fb is buggy, dev hsr_slave_1 [ 2530.680700] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.685733] protocol 88fb is buggy, dev hsr_slave_1 [ 2531.150530] protocol 88fb is buggy, dev hsr_slave_0 [ 2531.155632] protocol 88fb is buggy, dev hsr_slave_1 [ 2531.390510] protocol 88fb is buggy, dev hsr_slave_0 [ 2531.395601] protocol 88fb is buggy, dev hsr_slave_1 [ 2535.310576] net_ratelimit: 20 callbacks suppressed [ 2535.315585] protocol 88fb is buggy, dev hsr_slave_0 [ 2535.320647] protocol 88fb is buggy, dev hsr_slave_1 [ 2535.550545] protocol 88fb is buggy, dev hsr_slave_0 [ 2535.550550] protocol 88fb is buggy, dev hsr_slave_0 [ 2535.550645] protocol 88fb is buggy, dev hsr_slave_1 [ 2535.555676] protocol 88fb is buggy, dev hsr_slave_1 [ 2536.350576] protocol 88fb is buggy, dev hsr_slave_0 [ 2536.355693] protocol 88fb is buggy, dev hsr_slave_1 [ 2536.910534] protocol 88fb is buggy, dev hsr_slave_0 [ 2536.915644] protocol 88fb is buggy, dev hsr_slave_1 04:01:32 executing program 2: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x48201) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000500)='./bus\x00', 0x200) sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 04:01:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = dup3(r1, r0, 0x80000) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000100)) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:01:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2b54a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:32 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000ff00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5b, 0x0) 04:01:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 04:01:32 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000004003000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2d74a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2538.388902] kauditd_printk_skb: 9 callbacks suppressed [ 2538.388916] audit: type=1400 audit(2000001692.180:50881): avc: denied { map } for pid=13125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.546331] audit: type=1400 audit(2000001692.200:50882): avc: denied { map } for pid=13125 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:32 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000010000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2f14a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5c, 0x0) 04:01:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) getsockopt$inet_int(r1, 0x0, 0xe, 0x0, &(0x7f0000000180)) [ 2538.606810] audit: type=1400 audit(2000001692.200:50883): avc: denied { map } for pid=13125 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.669082] audit: type=1400 audit(2000001692.220:50884): avc: denied { map } for pid=13122 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fallocate(r0, 0x1, 0x0, 0x8000011) [ 2538.797558] audit: type=1400 audit(2000001692.220:50885): avc: denied { map } for pid=13122 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.821461] audit: type=1400 audit(2000001692.240:50886): avc: denied { map } for pid=13122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.846889] audit: type=1400 audit(2000001692.390:50887): avc: denied { map } for pid=13299 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.870126] audit: type=1400 audit(2000001692.400:50888): avc: denied { map } for pid=13299 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2538.895130] audit: type=1400 audit(2000001692.540:50889): avc: denied { map } for pid=13338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2539.000912] audit: type=1400 audit(2000001692.550:50890): avc: denied { map } for pid=13342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2540.510502] net_ratelimit: 20 callbacks suppressed [ 2540.515505] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.520644] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.070481] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.075697] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.080819] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.085858] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.550557] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.555715] protocol 88fb is buggy, dev hsr_slave_1 [ 2541.790500] protocol 88fb is buggy, dev hsr_slave_0 [ 2541.790505] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.710565] net_ratelimit: 20 callbacks suppressed [ 2545.715790] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.720927] protocol 88fb is buggy, dev hsr_slave_1 [ 2545.950532] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.955652] protocol 88fb is buggy, dev hsr_slave_1 [ 2545.960500] protocol 88fb is buggy, dev hsr_slave_0 [ 2545.965855] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.750620] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.755789] protocol 88fb is buggy, dev hsr_slave_1 [ 2547.310535] protocol 88fb is buggy, dev hsr_slave_0 [ 2547.315654] protocol 88fb is buggy, dev hsr_slave_1 04:01:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xb, "c0e23d6713fdfd510e26f8"}, &(0x7f0000000140)=0x13) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000180)={r3, 0xde, "4f502cc610c5db28ee21ee03615da3166a2e96cce77ba18cc4b2aad99e18b4b3aa1f54d44bfc801eb59d2294c606ecad56318de88088bdd93ccc48c31758817bddc336a3f99720988982e37d77d667eb24b9f75e200df00f2163a1cf4c1c89354596f7682066bd447fa2f83fbe09499d5065fc6135418d0ad4a688760a449029612facd9417fc494c318720973bf154a7accf2e55bc0df25ff948fa9dba0309d76e7677f7b481f0e9e02989f906f62fa122eb284f614405ce1dff5718fae576e03781c153d368aa3d25b2d284e7b3082fbb0617e59ba884ee098177f909a"}, &(0x7f0000000280)=0xe6) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r4 = fcntl$dupfd(r1, 0x0, r1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x201, 0x70bd2d, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) read$rfkill(r4, &(0x7f0000000080), 0x8) 04:01:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0xffffffffffffffd8) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xf5dd}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x3557dada) 04:01:42 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000340000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2f84a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5d, 0x0) 04:01:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=ANY=[@ANYBLOB="20000000dc0000000000000000010000003d35b6b0cc2346b4"], 0x19}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x23d, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x1, 0x200) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002ec0)={0x14, 0x40000000042, 0x105}, 0x2ec}}, 0x0) 04:01:42 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0006b6b6b000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2548.599500] kauditd_printk_skb: 10 callbacks suppressed [ 2548.599513] audit: type=1400 audit(2000001702.390:50901): avc: denied { map } for pid=13566 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2fd4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5e, 0x0) 04:01:42 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fffff0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2548.775403] audit: type=1400 audit(2000001702.440:50902): avc: denied { map } for pid=13566 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:42 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8200003) getsockopt(r1, 0x0, 0x6, &(0x7f0000000000)=""/127, &(0x7f0000000240)=0x7f) 04:01:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) ioctl$KIOCSOUND(r0, 0x4b2f, 0x4000000080000000) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) [ 2548.805049] audit: type=1400 audit(2000001702.460:50903): avc: denied { map } for pid=13566 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=ANY=[@ANYBLOB="20000000dc0000000000000000010000003d35b6b0cc2346b4"], 0x19}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x23d, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x1, 0x200) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002ec0)={0x14, 0x40000000042, 0x105}, 0x2ec}}, 0x0) 04:01:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a02049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2548.892232] audit: type=1400 audit(2000001702.480:50904): avc: denied { map } for pid=13646 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:42 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000010b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2549.024779] audit: type=1400 audit(2000001702.490:50905): avc: denied { map } for pid=13646 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5f, 0x0) 04:01:43 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000020b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2549.207265] audit: type=1400 audit(2000001702.490:50906): avc: denied { map } for pid=13646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a05049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=ANY=[@ANYBLOB="20000000dc0000000000000000010000003d35b6b0cc2346b4"], 0x19}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x23d, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x1, 0x200) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002ec0)={0x14, 0x40000000042, 0x105}, 0x2ec}}, 0x0) [ 2549.351068] audit: type=1400 audit(2000001702.490:50907): avc: denied { map } for pid=13646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x8000000000000, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = getpid() socket(0x5, 0xf, 0x0) sched_setattr(r1, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r3 = dup3(r2, r2, 0x80000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) [ 2549.416162] audit: type=1400 audit(2000001702.500:50908): avc: denied { map } for pid=13646 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2549.440516] audit: type=1400 audit(2000001702.680:50909): avc: denied { map } for pid=13776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2549.479432] audit: type=1400 audit(2000001702.720:50910): avc: denied { map } for pid=13776 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0fff9164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:43 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000030b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03029164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2550.910557] net_ratelimit: 20 callbacks suppressed [ 2550.915635] protocol 88fb is buggy, dev hsr_slave_0 [ 2550.920778] protocol 88fb is buggy, dev hsr_slave_1 [ 2551.470480] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.475576] protocol 88fb is buggy, dev hsr_slave_1 [ 2551.480690] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.485723] protocol 88fb is buggy, dev hsr_slave_1 [ 2551.950501] protocol 88fb is buggy, dev hsr_slave_0 [ 2551.955614] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.190517] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.190522] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.110553] net_ratelimit: 20 callbacks suppressed [ 2556.115575] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.120629] protocol 88fb is buggy, dev hsr_slave_1 [ 2556.350514] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.350519] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.350619] protocol 88fb is buggy, dev hsr_slave_1 [ 2556.355612] protocol 88fb is buggy, dev hsr_slave_1 [ 2557.150561] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.155653] protocol 88fb is buggy, dev hsr_slave_1 [ 2557.710516] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.715677] protocol 88fb is buggy, dev hsr_slave_1 04:01:53 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2a80) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:01:53 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x14000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) r4 = dup2(r3, r1) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$KDSETMODE(r4, 0x4b3a, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @remote}, 0x1c) 04:01:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000000)={0x2, 0xe3}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) 04:01:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x60, 0x0) 04:01:53 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000040b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03059164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:01:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03069164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2559.482345] kauditd_printk_skb: 30 callbacks suppressed [ 2559.482358] audit: type=1400 audit(2000001713.280:50941): avc: denied { map } for pid=14233 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:53 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000050b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x61, 0x0) [ 2559.646030] audit: type=1400 audit(2000001713.280:50942): avc: denied { map } for pid=14233 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a030a9164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2559.735956] audit: type=1400 audit(2000001713.280:50943): avc: denied { map } for pid=14233 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:01:53 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000060b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:01:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x8000000000000, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl(0xffffffffffffffff, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) [ 2559.836809] audit: type=1400 audit(2000001713.470:50944): avc: denied { map } for pid=14376 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2559.977737] audit: type=1400 audit(2000001713.480:50945): avc: denied { map } for pid=14376 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2560.044795] audit: type=1400 audit(2000001713.480:50946): avc: denied { map } for pid=14376 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2560.099076] audit: type=1400 audit(2000001713.480:50947): avc: denied { map } for pid=14376 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2560.132689] audit: type=1400 audit(2000001713.490:50948): avc: denied { map } for pid=14376 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2560.163295] audit: type=1400 audit(2000001713.600:50949): avc: denied { map } for pid=14450 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2560.191400] audit: type=1400 audit(2000001713.620:50950): avc: denied { map } for pid=14450 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2561.310510] net_ratelimit: 20 callbacks suppressed [ 2561.315671] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.320774] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.870490] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.875593] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.880689] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.885719] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.350496] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.355655] protocol 88fb is buggy, dev hsr_slave_1 [ 2562.590489] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.590513] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.510555] net_ratelimit: 20 callbacks suppressed [ 2566.515574] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.520633] protocol 88fb is buggy, dev hsr_slave_1 [ 2566.750527] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.750557] protocol 88fb is buggy, dev hsr_slave_1 [ 2566.755670] protocol 88fb is buggy, dev hsr_slave_1 [ 2567.550600] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.555765] protocol 88fb is buggy, dev hsr_slave_1 [ 2568.110500] protocol 88fb is buggy, dev hsr_slave_0 [ 2568.115625] protocol 88fb is buggy, dev hsr_slave_1 [ 2568.120764] protocol 88fb is buggy, dev hsr_slave_0 04:02:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0xfffffffffffffffa, 0xffffffffffffff2d) ioctl(r0, 0x2, &(0x7f0000000380)="0adc1f12d3418bad3d98fded181e573c123f319b36f01a0b087f5ffe3a9a1528386bb3d070") ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000180)) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) finit_module(r2, &(0x7f00000001c0)='/selinux/policy\x00', 0x1) listen(r3, 0x7) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000140)={0x2, 0x400000000, 0x6}) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) fadvise64(r2, 0x0, 0x100000000, 0x5) close(r5) r6 = fcntl$dupfd(r2, 0x0, r2) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x3, 0x0) read$rfkill(r6, &(0x7f0000000080), 0x8) 04:02:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a030c9164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:03 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8200003) getsockopt(r1, 0x7fffffff, 0x6, &(0x7f0000000000)=""/127, &(0x7f0000000240)=0x7f) 04:02:03 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000080b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x62, 0x0) 04:02:03 executing program 3: 04:02:03 executing program 3: [ 2569.705219] kauditd_printk_skb: 10 callbacks suppressed [ 2569.705233] audit: type=1400 audit(2000001723.500:50961): avc: denied { map } for pid=14673 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:03 executing program 2: 04:02:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03109164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:03 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000090b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2569.830476] audit: type=1400 audit(2000001723.540:50962): avc: denied { map } for pid=14673 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x8000000000000, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = getpid() socket(0x5, 0xf, 0x0) sched_setattr(r1, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup3(r2, r2, 0x80000) bind$unix(0xffffffffffffffff, 0x0, 0x10151) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) [ 2569.965704] audit: type=1400 audit(2000001723.540:50963): avc: denied { map } for pid=14673 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x63, 0x0) [ 2570.119338] audit: type=1400 audit(2000001723.620:50964): avc: denied { map } for pid=14681 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.271373] audit: type=1400 audit(2000001723.700:50965): avc: denied { map } for pid=14741 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.297078] audit: type=1400 audit(2000001723.830:50966): avc: denied { map } for pid=14790 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.329646] audit: type=1400 audit(2000001723.890:50967): avc: denied { map } for pid=14790 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.354382] audit: type=1400 audit(2000001723.980:50968): avc: denied { map } for pid=14874 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.376848] audit: type=1400 audit(2000001723.990:50969): avc: denied { map } for pid=14874 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2570.408160] audit: type=1400 audit(2000001723.990:50970): avc: denied { map } for pid=14874 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2571.710564] net_ratelimit: 19 callbacks suppressed [ 2571.715572] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.720683] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.270478] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.275791] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.281050] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.286241] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.750512] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.755670] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.990524] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.990529] protocol 88fb is buggy, dev hsr_slave_0 [ 2576.910539] net_ratelimit: 20 callbacks suppressed [ 2576.915560] protocol 88fb is buggy, dev hsr_slave_0 [ 2576.920718] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.150513] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.150521] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.150577] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.155636] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.950620] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.955750] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.510534] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.515623] protocol 88fb is buggy, dev hsr_slave_1 04:02:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200000, 0x0) write$nbd(r2, &(0x7f0000000140)={0x67446698, 0x0, 0x1, 0x1, 0x3, "11991da3a82c62b568dfe3d61e5bf843d7bc1e3d31cf23689a2a298ea5222431ba34da06520aa90e077f8d0e29271c3fa6a3148aaf31113214ed3735c7953b833ef92083da1e942f646b9d88b9ed2be9767697cc91344d24e0356fe9959213cdf6fa39f02dd15eb000e42c4ec72e0c7af8fbf6fe41abce520814c5ac9c07b8079418189264f26d098a0822d48dccbf95cf6595bff4f91f11f33177ef6700"}, 0xae) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80, 0x0) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:02:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x64, 0x0) 04:02:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) getpid() socket(0x5, 0xf, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) sched_setaffinity(0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) 04:02:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03539164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000a0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x8000000000000, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = getpid() socket(0x5, 0xf, 0x0) sched_setattr(r1, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) [ 2580.594316] kauditd_printk_skb: 2 callbacks suppressed [ 2580.594330] audit: type=1400 audit(2000001734.390:50973): avc: denied { map } for pid=15111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a030fff64643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000b0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2580.729784] audit: type=1400 audit(2000001734.420:50974): avc: denied { map } for pid=15111 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x65, 0x0) 04:02:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000c0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164649389720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2580.856178] audit: type=1400 audit(2000001734.560:50975): avc: denied { map } for pid=15167 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:14 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) pipe2$9p(0x0, 0x0) [ 2581.046003] audit: type=1400 audit(2000001734.750:50976): avc: denied { map } for pid=15322 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.079863] audit: type=1400 audit(2000001734.770:50977): avc: denied { map } for pid=15323 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.130690] audit: type=1400 audit(2000001734.800:50978): avc: denied { map } for pid=15323 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.211134] audit: type=1400 audit(2000001734.800:50979): avc: denied { map } for pid=15323 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.240828] audit: type=1400 audit(2000001734.890:50980): avc: denied { map } for pid=15328 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.263698] audit: type=1400 audit(2000001734.900:50981): avc: denied { map } for pid=15328 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2581.288457] audit: type=1400 audit(2000001734.910:50982): avc: denied { map } for pid=15328 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2582.110550] net_ratelimit: 20 callbacks suppressed [ 2582.115581] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.120694] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.670473] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.675588] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.680709] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.685746] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.150501] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.155637] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.390480] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.390485] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.310481] net_ratelimit: 20 callbacks suppressed [ 2587.310490] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.320604] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.550540] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.550545] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.550601] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.555704] protocol 88fb is buggy, dev hsr_slave_1 [ 2588.350572] protocol 88fb is buggy, dev hsr_slave_0 [ 2588.355726] protocol 88fb is buggy, dev hsr_slave_1 [ 2588.910489] protocol 88fb is buggy, dev hsr_slave_0 [ 2588.915586] protocol 88fb is buggy, dev hsr_slave_1 04:02:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x4e24, @remote}}) read$eventfd(r2, &(0x7f0000000080), 0x8) read$rfkill(r2, &(0x7f0000000140), 0x8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0x9, 0x3f}) 04:02:24 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") 04:02:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, &(0x7f0000d83ff8), 0x2008000fffffffe) 04:02:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0304916464a789720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000e0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x66, 0x0) 04:02:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000f0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2590.852991] kauditd_printk_skb: 7 callbacks suppressed [ 2590.853005] audit: type=1400 audit(2000001744.650:50990): avc: denied { map } for pid=15444 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0304916464bc89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2591.029097] audit: type=1400 audit(2000001744.650:50991): avc: denied { map } for pid=15444 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:24 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x916f133f5929a356) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) ioctl$int_in(r3, 0x5452, &(0x7f00000003c0)=0x100000001) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @rand_addr, 0x8000000000000000}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, 0x0, 0x0) pause() ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000340)=@generic={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180), 0x4) r4 = getpgrp(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) rt_sigqueueinfo(r4, 0x19, &(0x7f0000000240)={0x16, 0x80, 0x7}) ftruncate(r5, 0x7fff) sendfile(r3, r5, 0x0, 0x8000fffffffe) 04:02:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x67, 0x0) 04:02:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000100b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:24 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 2591.165105] audit: type=1400 audit(2000001744.650:50992): avc: denied { map } for pid=15444 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.263368] audit: type=1400 audit(2000001744.650:50993): avc: denied { map } for pid=15444 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.309047] audit: type=1400 audit(2000001744.730:50994): avc: denied { map } for pid=15472 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.338175] audit: type=1400 audit(2000001744.750:50995): avc: denied { map } for pid=15508 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.447349] audit: type=1400 audit(2000001744.780:50996): avc: denied { map } for pid=15508 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.480979] audit: type=1400 audit(2000001744.810:50997): avc: denied { map } for pid=15590 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.506645] audit: type=1400 audit(2000001744.810:50998): avc: denied { map } for pid=15590 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2591.535844] audit: type=1400 audit(2000001744.820:50999): avc: denied { map } for pid=15590 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2592.510529] net_ratelimit: 20 callbacks suppressed [ 2592.510538] protocol 88fb is buggy, dev hsr_slave_0 [ 2592.520636] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.070458] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.075560] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.080699] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.085808] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.550526] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.555664] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.790452] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.790458] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.710491] net_ratelimit: 20 callbacks suppressed [ 2597.715501] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.720567] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.950498] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.950503] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.950550] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.955641] protocol 88fb is buggy, dev hsr_slave_1 [ 2598.750537] protocol 88fb is buggy, dev hsr_slave_0 [ 2598.755686] protocol 88fb is buggy, dev hsr_slave_1 [ 2599.310501] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.315603] protocol 88fb is buggy, dev hsr_slave_1 04:02:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0afb1f123c123f9bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f0000000200)=@HCI_ACLDATA_PKT={0x2, "431d80f5508e37eecb744a257e11b4681381ed8e4c71c8566fa4806c0b5885b1cd8ac47eb4f0d263b85bdb66e72a660b60da6568d3f97dd27bb517f283ba16d949af6532b33a695ec827032edff06521b9f19f4beb842633837593fd22e63775f9b1a23261a809"}, 0x68) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 04:02:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720200de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000003f0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) 04:02:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x68, 0x0) 04:02:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0xe8) 04:02:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003460b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720400de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2601.069369] kauditd_printk_skb: 16 callbacks suppressed [ 2601.069382] audit: type=1400 audit(2000001754.860:51016): avc: denied { map } for pid=15989 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.179767] audit: type=1400 audit(2000001754.870:51017): avc: denied { map } for pid=15989 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:35 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x2d, 0x1, @scatter={0x8, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {0x0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08e990f9b506", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) 04:02:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x69, 0x0) 04:02:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720a00de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:35 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003470b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2601.298764] audit: type=1400 audit(2000001755.020:51018): avc: denied { map } for pid=16168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.406517] audit: type=1400 audit(2000001755.050:51019): avc: denied { map } for pid=16168 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.447185] audit: type=1400 audit(2000001755.140:51020): avc: denied { map } for pid=16201 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.453355] IPVS: ftp: loaded support on port[0] = 21 [ 2601.478420] audit: type=1400 audit(2000001755.150:51021): avc: denied { map } for pid=16201 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.537811] audit: type=1400 audit(2000001755.160:51022): avc: denied { map } for pid=16201 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.726072] audit: type=1400 audit(2000001755.380:51023): avc: denied { map } for pid=16211 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.756961] audit: type=1400 audit(2000001755.430:51024): avc: denied { map } for pid=16214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.792935] audit: type=1400 audit(2000001755.470:51025): avc: denied { map } for pid=16278 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.873237] IPVS: ftp: loaded support on port[0] = 21 04:02:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720e00de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x624200, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}]}) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:02:35 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x2d, 0x1, @scatter={0x8, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {0x0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08e990f9b506", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) 04:02:35 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000600b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6a, 0x0) 04:02:35 executing program 3: r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) write(r0, 0x0, 0x0) sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r4 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4000000011, r4, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r4, 0x48201) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0xbfe00) write$smack_current(r4, &(0x7f0000000080)='selinux\x00', 0x8) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000500)='./bus\x00', 0x200) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x808100000000) 04:02:35 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000058650b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720f00de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6b, 0x0) 04:02:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000006b6b6b0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89726000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001f0ff00004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:02:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000810b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2602.635345] EXT4-fs (loop3): Invalid log cluster size: 16773121 [ 2602.910509] net_ratelimit: 19 callbacks suppressed [ 2602.910518] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.920721] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.470475] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.475621] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.480744] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.485815] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.950458] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.955587] protocol 88fb is buggy, dev hsr_slave_1 [ 2604.190465] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.190510] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.110535] net_ratelimit: 20 callbacks suppressed [ 2608.115539] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.120629] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.350505] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.350509] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.350565] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.355714] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.150595] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.155747] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.710495] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.715577] protocol 88fb is buggy, dev hsr_slave_1 04:02:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000100), 0x3dc) 04:02:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972e000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:46 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000ffffa8880b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6c, 0x0) 04:02:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x7c) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) pipe2$9p(0x0, 0x0) 04:02:46 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff, 0x84e}) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000540)={0x0, 0x0}) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0x2d, 0x1, @scatter={0x8, 0x0, &(0x7f0000001680)=[{&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000140)=""/60, 0x3c}, {0x0}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/140, 0x8c}, {&(0x7f0000000340)=""/127, 0x7f}, {0x0}]}, &(0x7f0000001740)="27d16347a54151f1908ef36a0eb3e10ba13f613b716253f3ac4efec2a25d5d669a17a0de7409ea08e990f9b506", 0x0, 0x8c, 0x31, 0x2, 0x0}) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000003c0)) unshare(0x40000000) [ 2612.596157] kauditd_printk_skb: 39 callbacks suppressed [ 2612.596170] audit: type=1400 audit(2000001766.390:51065): avc: denied { map } for pid=16870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.607034] audit: type=1400 audit(2000001766.400:51066): avc: denied { map } for pid=16870 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.668257] IPVS: ftp: loaded support on port[0] = 21 04:02:46 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000ffffff9e0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972f000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2612.698251] audit: type=1400 audit(2000001766.450:51067): avc: denied { map } for pid=16870 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6d, 0x0) 04:02:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)) 04:02:46 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000001ac50b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2612.943168] audit: type=1400 audit(2000001766.600:51068): avc: denied { map } for pid=16992 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.965575] audit: type=1400 audit(2000001766.610:51069): avc: denied { map } for pid=16992 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:46 executing program 2: mknod(&(0x7f0000000080)='./bus\x00', 0x8000, 0x4028ab) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="000000186004008b00233a27feff562c7e84f125b6c2103519edffff0301000000bf78008c9798171fbb18fb9d568e58a6b193ce01c31286a2a21da3ac621f17709efff091ec51f8a0d902da5691d8", 0x4f}], 0x1) [ 2613.046886] audit: type=1400 audit(2000001766.840:51070): avc: denied { map } for pid=17185 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2613.165971] audit: type=1400 audit(2000001766.900:51071): avc: denied { map } for pid=17186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2613.256591] audit: type=1400 audit(2000001767.020:51072): avc: denied { map } for pid=17285 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2613.310489] net_ratelimit: 20 callbacks suppressed [ 2613.310497] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.320127] audit: type=1400 audit(2000001767.050:51073): avc: denied { map } for pid=17285 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2613.320583] protocol 88fb is buggy, dev hsr_slave_1 [ 2613.351345] audit: type=1400 audit(2000001767.090:51074): avc: denied { map } for pid=17362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2613.880447] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.885582] protocol 88fb is buggy, dev hsr_slave_1 [ 2613.890709] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.895751] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.350487] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.355600] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.590472] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.590488] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.510541] net_ratelimit: 20 callbacks suppressed [ 2618.515541] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.520610] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.750514] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.750529] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.755656] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.760690] protocol 88fb is buggy, dev hsr_slave_1 [ 2619.550608] protocol 88fb is buggy, dev hsr_slave_0 [ 2619.555765] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.110514] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.115598] protocol 88fb is buggy, dev hsr_slave_1 04:02:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000e00b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x246) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x42000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000240)=0x4) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000080), 0x8) 04:02:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6e, 0x0) 04:02:57 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 04:02:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) dup3(r1, r2, 0x0) 04:02:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89724703de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:02:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fffffff00b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000ade213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2623.483556] kauditd_printk_skb: 1 callbacks suppressed [ 2623.483593] audit: type=1400 audit(2000001777.280:51076): avc: denied { map } for pid=17409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2623.536266] audit: type=1400 audit(2000001777.310:51077): avc: denied { map } for pid=17409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2623.603686] audit: type=1400 audit(2000001777.330:51078): avc: denied { map } for pid=17409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:02:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6f, 0x0) 04:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x7fffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) [ 2623.703315] audit: type=1400 audit(2000001777.340:51079): avc: denied { map } for pid=17409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2623.728181] net_ratelimit: 20 callbacks suppressed [ 2623.728189] protocol 88fb is buggy, dev hsr_slave_0 [ 2623.728236] protocol 88fb is buggy, dev hsr_slave_1 04:02:57 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x141042, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 04:02:57 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000fc0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:02:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000ede213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2623.902494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2623.927159] audit: type=1400 audit(2000001777.340:51080): avc: denied { map } for pid=17409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.027697] audit: type=1400 audit(2000001777.490:51081): avc: denied { map } for pid=17591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.086354] audit: type=1400 audit(2000001777.500:51082): avc: denied { map } for pid=17591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.096159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2624.119217] audit: type=1400 audit(2000001777.500:51083): avc: denied { map } for pid=17591 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.150297] audit: type=1400 audit(2000001777.500:51084): avc: denied { map } for pid=17591 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.175061] audit: type=1400 audit(2000001777.600:51085): avc: denied { map } for pid=17719 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.270563] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.275666] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.280793] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.285861] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.750467] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.755663] protocol 88fb is buggy, dev hsr_slave_1 [ 2628.910496] net_ratelimit: 22 callbacks suppressed [ 2628.910504] protocol 88fb is buggy, dev hsr_slave_0 [ 2628.920654] protocol 88fb is buggy, dev hsr_slave_1 [ 2629.150517] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.150522] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.150579] protocol 88fb is buggy, dev hsr_slave_1 [ 2629.155663] protocol 88fb is buggy, dev hsr_slave_1 [ 2629.950506] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.955612] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.510522] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.515619] protocol 88fb is buggy, dev hsr_slave_1 04:03:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) write$capi20(r2, &(0x7f00000001c0)={0x10, 0x7, 0xff, 0x80, 0x4, 0x3}, 0x10) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000200), 0xfffffffffffffe7c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x2, 0x1, 0x2, 0xa422, 0x2, [{0x80, 0x40000000, 0x7, 0x0, 0x0, 0x100}, {0x3e8, 0x0, 0x0, 0x0, 0x0, 0x101}]}) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000080)) 04:03:07 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fffffffc0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 04:03:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972c00ede213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:07 executing program 2: r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prlimit64(r0, 0x0, 0x0, &(0x7f0000000100)) 04:03:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x70, 0x0) [ 2633.686003] kauditd_printk_skb: 12 callbacks suppressed [ 2633.686017] audit: type=1400 audit(2000001787.480:51098): avc: denied { getrlimit } for pid=17841 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 04:03:07 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000080fe0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 04:03:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000fde213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2633.813769] audit: type=1400 audit(2000001787.490:51099): avc: denied { map } for pid=17847 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x71, 0x0) 04:03:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972291bde213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2633.978990] audit: type=1400 audit(2000001787.690:51100): avc: denied { map } for pid=17978 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:07 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000c0fe0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2634.044560] audit: type=1400 audit(2000001787.700:51101): avc: denied { map } for pid=17968 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.110499] net_ratelimit: 20 callbacks suppressed [ 2634.110507] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.120598] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.181875] audit: type=1400 audit(2000001787.700:51102): avc: denied { map } for pid=17968 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.218325] audit: type=1400 audit(2000001787.710:51103): avc: denied { map } for pid=17968 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.267820] audit: type=1400 audit(2000001787.720:51104): avc: denied { map } for pid=17968 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.303089] audit: type=1400 audit(2000001787.730:51105): avc: denied { map } for pid=17968 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.328027] audit: type=1400 audit(2000001787.900:51106): avc: denied { map } for pid=18116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.350279] audit: type=1400 audit(2000001787.900:51107): avc: denied { map } for pid=18116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2634.670465] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.675676] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.680830] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.685862] protocol 88fb is buggy, dev hsr_slave_1 [ 2635.150484] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.155653] protocol 88fb is buggy, dev hsr_slave_1 [ 2635.390467] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.390522] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.310527] net_ratelimit: 19 callbacks suppressed [ 2639.315544] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.320656] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.550548] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.550556] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.550613] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.555690] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.350522] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.355620] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.910514] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.915604] protocol 88fb is buggy, dev hsr_slave_1 04:03:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x43) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000040)=[{}, {}], 0x0, [{}, {}, {}]}, 0xa8) 04:03:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 04:03:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, &(0x7f0000d83ff8), 0x2008000fffffffe) 04:03:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x72, 0x0) 04:03:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89721b29de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000ff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00088a8ffff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720347de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2643.983618] kauditd_printk_skb: 11 callbacks suppressed [ 2643.983631] audit: type=1400 audit(2000001797.770:51119): avc: denied { map } for pid=18186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x73, 0x0) [ 2644.141036] audit: type=1400 audit(2000001797.790:51120): avc: denied { map } for pid=18186 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:17 executing program 2: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) getpid() ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f00000012c0)={'ip6gre0\x00', @empty=[0x0, 0x0, 0x43]}) 04:03:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000000)="0adc1f123c123f319bd070") read(r0, &(0x7f0000000280)=""/227, 0xe3) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r2, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) getsockopt$inet_buf(r0, 0x0, 0x31, &(0x7f0000000100)=""/232, &(0x7f0000000040)=0xe8) fcntl$dupfd(r2, 0x406, r0) read$rfkill(r1, &(0x7f0000000240), 0xffffffffffffffce) 04:03:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}, 0x0, 0xffffffffffffffff}) 04:03:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000f0ffff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2644.175616] audit: type=1400 audit(2000001797.870:51121): avc: denied { map } for pid=18268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2644.212317] audit: type=1400 audit(2000001797.870:51122): avc: denied { map } for pid=18268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720060de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2644.279944] audit: type=1400 audit(2000001798.070:51123): avc: denied { map } for pid=18498 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0009effffff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2644.414324] audit: type=1400 audit(2000001798.130:51124): avc: denied { map } for pid=18520 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@rand_addr=0xffffffff9e3e96ce, @broadcast}, 0x8) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$getown(r1, 0x9) ptrace$getregs(0xc, r2, 0x1, &(0x7f0000000100)=""/141) r3 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r3, &(0x7f0000000040), 0xfffffe63) 04:03:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) 04:03:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x101000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000640)=""/208) [ 2644.510495] net_ratelimit: 20 callbacks suppressed [ 2644.510503] protocol 88fb is buggy, dev hsr_slave_0 [ 2644.520646] protocol 88fb is buggy, dev hsr_slave_1 04:03:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720ec0de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2644.570320] audit: type=1400 audit(2000001798.130:51125): avc: denied { map } for pid=18520 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x74, 0x0) 04:03:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e897200e0de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000f0ffffff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2644.731193] audit: type=1400 audit(2000001798.130:51126): avc: denied { map } for pid=18520 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0x56) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2) close(0xffffffffffffffff) [ 2644.874673] audit: type=1400 audit(2000001798.160:51127): avc: denied { map } for pid=18520 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000fcffffff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x20, r1, 0x801, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x02'}]}]}, 0x20}}, 0x0) 04:03:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e897200f0de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2644.989692] audit: type=1400 audit(2000001798.180:51128): avc: denied { map } for pid=18599 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x75, 0x0) [ 2645.070473] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.075607] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.080791] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.085863] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.550465] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.555672] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.790521] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.795738] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.710507] net_ratelimit: 20 callbacks suppressed [ 2649.710516] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.720594] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.950516] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.950522] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.950581] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.955653] protocol 88fb is buggy, dev hsr_slave_1 [ 2650.750551] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.755638] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.310506] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.315631] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.910589] net_ratelimit: 20 callbacks suppressed [ 2654.916136] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.921274] protocol 88fb is buggy, dev hsr_slave_1 04:03:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") eventfd2(0x5, 0x1) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) 04:03:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x3, @win={{}, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000003c0)="4d7a7dce695fad5b5b3b9725f6afff0582d2429d8e303c05c88d0c9d5dd4bba5", 0x7}}) 04:03:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000020000000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:29 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0cc5640, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 04:03:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720fffde213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x76, 0x0) [ 2655.470454] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.475670] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.480901] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.485992] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.499576] kauditd_printk_skb: 56 callbacks suppressed 04:03:29 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000140)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) 04:03:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720002de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000200000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2655.499590] audit: type=1400 audit(2000001809.290:51185): avc: denied { map } for pid=19268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='cgroup.max.descendants\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x420040, 0x0) r2 = dup(r1) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, 0x0) lstat(0x0, 0x0) getresgid(&(0x7f00000014c0), 0x0, 0x0) getgroups(0x0, 0x0) stat(0x0, &(0x7f0000001bc0)) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f0000000140)) [ 2655.609137] audit: type=1400 audit(2000001809.330:51186): avc: denied { map } for pid=19268 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x77, 0x0) 04:03:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40203) [ 2655.732387] audit: type=1400 audit(2000001809.340:51187): avc: denied { map } for pid=19268 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000300000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720004de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:29 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x9, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 2655.909317] audit: type=1400 audit(2000001809.340:51188): avc: denied { map } for pid=19268 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r1, &(0x7f0000000080), 0x0}, 0x18) [ 2655.950476] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.955699] protocol 88fb is buggy, dev hsr_slave_1 [ 2656.048244] audit: type=1400 audit(2000001809.350:51189): avc: denied { map } for pid=19268 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:29 executing program 3: clone(0x803102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x169, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 04:03:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000ade213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000400000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2656.100041] audit: type=1400 audit(2000001809.350:51190): avc: denied { map } for pid=19268 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2656.190462] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.190497] protocol 88fb is buggy, dev hsr_slave_1 [ 2656.209173] audit: type=1400 audit(2000001809.360:51191): avc: denied { map } for pid=19268 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x78, 0x0) [ 2656.295156] audit: type=1400 audit(2000001809.440:51192): avc: denied { map } for pid=19300 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000ede213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)={0x1, 0x0, [{0x490}]}) [ 2656.338677] audit: type=1400 audit(2000001809.450:51193): avc: denied { map } for pid=19300 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2656.403473] audit: type=1400 audit(2000001809.500:51194): avc: denied { map } for pid=19409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000500000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2660.110605] net_ratelimit: 19 callbacks suppressed [ 2660.115736] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.121001] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.350552] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.350557] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.350630] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.355685] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.150623] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.156262] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.710553] protocol 88fb is buggy, dev hsr_slave_0 [ 2661.715964] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.310532] net_ratelimit: 20 callbacks suppressed [ 2665.315528] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.320665] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.870507] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.875600] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.880705] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.885725] protocol 88fb is buggy, dev hsr_slave_1 04:03:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x5, 0x3, &(0x7f0000000040)=0x9}) 04:03:40 executing program 3: 04:03:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x79, 0x0) 04:03:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000600000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000fde213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:40 executing program 2: 04:03:40 executing program 2: [ 2666.343990] kauditd_printk_skb: 54 callbacks suppressed [ 2666.344004] audit: type=1400 audit(2000001820.140:51249): avc: denied { map } for pid=19855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.350486] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.376676] protocol 88fb is buggy, dev hsr_slave_1 04:03:40 executing program 3: 04:03:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720060de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000800000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7a, 0x0) [ 2666.536781] audit: type=1400 audit(2000001820.140:51250): avc: denied { map } for pid=19855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:40 executing program 2: [ 2666.590450] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.590483] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.678215] audit: type=1400 audit(2000001820.200:51251): avc: denied { map } for pid=19855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.759059] audit: type=1400 audit(2000001820.200:51252): avc: denied { map } for pid=19855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.798265] audit: type=1400 audit(2000001820.280:51253): avc: denied { map } for pid=19859 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.844577] audit: type=1400 audit(2000001820.400:51254): avc: denied { map } for pid=20058 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.867024] audit: type=1400 audit(2000001820.400:51255): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.899023] audit: type=1400 audit(2000001820.400:51256): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.924613] audit: type=1400 audit(2000001820.460:51257): avc: denied { map } for pid=20068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2666.947293] audit: type=1400 audit(2000001820.480:51258): avc: denied { map } for pid=20068 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2670.510516] net_ratelimit: 19 callbacks suppressed [ 2670.510524] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.520638] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.750536] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.750541] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.750598] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.755628] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.550599] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.555760] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.110480] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.115578] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.710548] net_ratelimit: 19 callbacks suppressed [ 2675.715541] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.720644] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.270501] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.275648] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.280763] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.285779] protocol 88fb is buggy, dev hsr_slave_1 04:03:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r2, &(0x7f0000000080), 0x8) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000100)=0x4) 04:03:50 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000012}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1004000000016) 04:03:50 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000900000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:03:50 executing program 2: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x0, 0x3ff, 0xfffffffffffffff8}) 04:03:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7b, 0x0) 04:03:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e897200e0de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e8972000fff213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x14000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 04:03:50 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000a00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2676.604198] kauditd_printk_skb: 7 callbacks suppressed [ 2676.604211] audit: type=1400 audit(2000001830.400:51266): avc: denied { map } for pid=20192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2676.692237] audit: type=1400 audit(2000001830.440:51267): avc: denied { map } for pid=20192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:03:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de2193e23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:03:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7c, 0x0) [ 2676.760493] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.773091] protocol 88fb is buggy, dev hsr_slave_1 04:03:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) [ 2676.824950] audit: type=1400 audit(2000001830.560:51268): avc: denied { map } for pid=20393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2676.985041] audit: type=1400 audit(2000001830.600:51269): avc: denied { map } for pid=20389 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.007408] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.007463] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.098880] audit: type=1400 audit(2000001830.600:51270): avc: denied { map } for pid=20389 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.122152] audit: type=1400 audit(2000001830.610:51271): avc: denied { map } for pid=20389 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.146789] audit: type=1400 audit(2000001830.610:51272): avc: denied { map } for pid=20389 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.171603] audit: type=1400 audit(2000001830.610:51273): avc: denied { map } for pid=20389 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.278619] audit: type=1400 audit(2000001830.760:51274): avc: denied { map } for pid=20410 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.315639] audit: type=1400 audit(2000001830.760:51275): avc: denied { map } for pid=20406 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2680.910497] net_ratelimit: 20 callbacks suppressed [ 2680.910505] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.920584] protocol 88fb is buggy, dev hsr_slave_1 [ 2681.150523] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.150528] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.150588] protocol 88fb is buggy, dev hsr_slave_1 [ 2681.155653] protocol 88fb is buggy, dev hsr_slave_1 [ 2681.950561] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.955687] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.510516] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.515606] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.110585] net_ratelimit: 20 callbacks suppressed [ 2686.115678] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.120788] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.670539] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.675626] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.680759] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.685872] protocol 88fb is buggy, dev hsr_slave_1 04:04:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$vhci(r1, &(0x7f00000000c0)=@HCI_VENDOR_PKT, 0x2) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) recvmsg(r0, &(0x7f00000015c0)={&(0x7f0000000140)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/119, 0x77}, {&(0x7f0000000240)=""/240, 0xf0}, {&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000440)=""/187, 0xbb}, {&(0x7f0000000500)=""/51, 0x33}], 0x5, &(0x7f00000005c0)=""/4096, 0x1000}, 0x162) sendmsg$nl_route(r2, &(0x7f0000001680)={&(0x7f0000000100), 0xc, &(0x7f0000001640)={&(0x7f0000001600)=@ipmr_newroute={0x28, 0x18, 0x600, 0x70bd26, 0x25dfdbff, {0x80, 0x14, 0x20, 0x4, 0xfe, 0x6, 0xff, 0x2, 0x100}, [@RTA_MULTIPATH={0xc, 0x9, {0x3f, 0x2, 0x100000000, r3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4011}, 0x40000) r4 = fcntl$dupfd(r1, 0x0, r1) read$rfkill(r4, &(0x7f0000000080), 0x8) 04:04:00 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000b00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_sigaction(0x1c, &(0x7f0000000140)={0x0, {}, 0x0, 0x0}, &(0x7f0000000200)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f00000005c0)) 04:04:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7d, 0x0) 04:04:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)={0x1, 0x0, [{0x486}]}) 04:04:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de21a7e23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:00 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000c00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de21bce23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2686.828422] kauditd_printk_skb: 9 callbacks suppressed [ 2686.828435] audit: type=1400 audit(2000001840.620:51285): avc: denied { map } for pid=20625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:00 executing program 2: mlock(&(0x7f0000222000/0x1000)=nil, 0x1000) mmap(&(0x7f00002c8000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f000035d000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000759000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000779000/0x2000)=nil, 0x2000, 0x0, 0x1132, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a97000/0x1000)=nil, 0x1000, 0x0, 0x1000000000002032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00004e1000/0x4000)=nil, 0x4000, 0x0, 0x200, 0x4000) [ 2686.974122] audit: type=1400 audit(2000001840.670:51286): avc: denied { map } for pid=20625 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7e, 0x0) 04:04:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffb2b10040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, &(0x7f0000d83ff8)=0x1d, 0x2008000fffffffe) [ 2687.121419] audit: type=1400 audit(2000001840.670:51287): avc: denied { map } for pid=20625 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.150474] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.155641] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.265222] audit: type=1400 audit(2000001840.670:51288): avc: denied { map } for pid=20625 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.324346] audit: type=1400 audit(2000001840.850:51289): avc: denied { map } for pid=20838 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.390468] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.390484] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.398812] audit: type=1400 audit(2000001840.850:51290): avc: denied { map } for pid=20838 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.424378] audit: type=1400 audit(2000001840.870:51291): avc: denied { map } for pid=20832 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.449269] audit: type=1400 audit(2000001840.870:51292): avc: denied { map } for pid=20832 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.474838] audit: type=1400 audit(2000001841.000:51293): avc: denied { map } for pid=20846 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.497337] audit: type=1400 audit(2000001841.020:51294): avc: denied { map } for pid=20848 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2691.310516] net_ratelimit: 20 callbacks suppressed [ 2691.315529] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.320637] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.550549] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.550554] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.550596] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.555664] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.350590] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.355768] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.910499] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.915594] protocol 88fb is buggy, dev hsr_slave_1 [ 2696.510569] net_ratelimit: 20 callbacks suppressed [ 2696.515559] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.520668] protocol 88fb is buggy, dev hsr_slave_1 04:04:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername$inet(r0, 0x0, 0x0) 04:04:10 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, 0x0) 04:04:10 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x14000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) dup2(r2, r0) 04:04:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffb9310040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x82, 0x0) 04:04:10 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000e00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:10 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000f00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2697.070466] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.075601] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.080782] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.085866] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.093668] kauditd_printk_skb: 11 callbacks suppressed 04:04:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbc210040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2697.093681] audit: type=1400 audit(2000001850.880:51306): avc: denied { map } for pid=21084 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:10 executing program 4: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x48201) truncate(&(0x7f0000000500)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:04:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000001b80)=[{&(0x7f0000001840)=""/110, 0x6e}], 0x1, 0x0) [ 2697.219164] audit: type=1400 audit(2000001850.890:51307): avc: denied { map } for pid=21084 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x83, 0x0) 04:04:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf502040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000001000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2697.369367] audit: type=1400 audit(2000001850.890:51308): avc: denied { map } for pid=21084 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:11 executing program 3: 04:04:11 executing program 2: [ 2697.550540] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.552771] audit: type=1400 audit(2000001850.890:51309): avc: denied { map } for pid=21084 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2697.555664] protocol 88fb is buggy, dev hsr_slave_1 04:04:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000006000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf508040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:11 executing program 4: 04:04:11 executing program 3: 04:04:11 executing program 2: 04:04:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x84, 0x0) [ 2697.790443] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.790479] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.812911] audit: type=1400 audit(2000001850.970:51310): avc: denied { map } for pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf50a040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:11 executing program 3: [ 2697.920466] audit: type=1400 audit(2000001850.970:51311): avc: denied { map } for pid=21097 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:11 executing program 2: 04:04:11 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000e000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2698.020527] audit: type=1400 audit(2000001850.980:51312): avc: denied { map } for pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:11 executing program 4: 04:04:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510020041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2698.157134] audit: type=1400 audit(2000001851.000:51313): avc: denied { map } for pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:12 executing program 2: 04:04:12 executing program 3: 04:04:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000f000000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x85, 0x0) [ 2698.351421] audit: type=1400 audit(2000001851.000:51314): avc: denied { map } for pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:12 executing program 3: 04:04:12 executing program 4: 04:04:12 executing program 2: 04:04:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000fc00000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2698.525341] audit: type=1400 audit(2000001851.020:51315): avc: denied { map } for pid=21097 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510050041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:12 executing program 4: 04:04:12 executing program 3: 04:04:12 executing program 2: 04:04:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x86, 0x0) 04:04:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510060041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:12 executing program 4: 04:04:12 executing program 3: 04:04:12 executing program 2: 04:04:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000004603000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:12 executing program 4: 04:04:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100a0041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:12 executing program 3: 04:04:12 executing program 2: 04:04:12 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000004703000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100c0041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x87, 0x0) 04:04:12 executing program 3: 04:04:12 executing program 4: 04:04:13 executing program 4: 04:04:13 executing program 2: 04:04:13 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000005000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:13 executing program 3: 04:04:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510100041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:13 executing program 3: 04:04:13 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000006000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:13 executing program 2: 04:04:13 executing program 4: 04:04:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x88, 0x0) 04:04:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510530041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:13 executing program 4: 04:04:13 executing program 3: 04:04:13 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000009000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:13 executing program 2: 04:04:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510586541feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:13 executing program 4: 04:04:13 executing program 2: 04:04:13 executing program 3: 04:04:13 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000a000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:13 executing program 4: 04:04:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x89, 0x0) 04:04:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000b000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:14 executing program 3: 04:04:14 executing program 2: 04:04:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510008141feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:14 executing program 4: 04:04:14 executing program 2: 04:04:14 executing program 3: 04:04:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100fff41feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000c000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:14 executing program 4: 04:04:14 executing program 3: 04:04:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000e000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8a, 0x0) 04:04:14 executing program 4: 04:04:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040241feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:14 executing program 2: 04:04:14 executing program 3: 04:04:14 executing program 2: 04:04:14 executing program 4: 04:04:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040441feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:14 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000f000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:14 executing program 3: 04:04:14 executing program 2: 04:04:14 executing program 4: 04:04:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8b, 0x0) 04:04:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040a41feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000c51a000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:15 executing program 3: 04:04:15 executing program 4: 04:04:15 executing program 2: 04:04:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040e41feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000003f000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:15 executing program 3: 04:04:15 executing program 4: 04:04:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8c, 0x0) 04:04:15 executing program 2: 04:04:15 executing program 3: 04:04:15 executing program 4: [ 2701.710474] net_ratelimit: 18 callbacks suppressed [ 2701.710482] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.720573] protocol 88fb is buggy, dev hsr_slave_1 04:04:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040f41feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000346000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:15 executing program 2: 04:04:15 executing program 4: 04:04:15 executing program 3: [ 2701.950453] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.950458] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.950507] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.955648] protocol 88fb is buggy, dev hsr_slave_1 04:04:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510046041feff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:15 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000347000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:15 executing program 2: 04:04:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8d, 0x0) 04:04:15 executing program 4: 04:04:15 executing program 3: [ 2702.112116] kauditd_printk_skb: 259 callbacks suppressed [ 2702.112129] audit: type=1400 audit(2000001855.910:51575): avc: denied { map } for pid=22646 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf51004e041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2702.210094] audit: type=1400 audit(2000001855.980:51576): avc: denied { map } for pid=22658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 3: 04:04:16 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000006558000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:16 executing program 4: 04:04:16 executing program 2: 04:04:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040ffffeff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2702.421193] audit: type=1400 audit(2000001856.030:51577): avc: denied { map } for pid=22658 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2702.520204] audit: type=1400 audit(2000001856.080:51578): avc: denied { map } for pid=22666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 3: 04:04:16 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000060000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8e, 0x0) [ 2702.639119] audit: type=1400 audit(2000001856.090:51579): avc: denied { map } for pid=22665 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 2: 04:04:16 executing program 4: [ 2702.750514] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.755650] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.761697] audit: type=1400 audit(2000001856.100:51580): avc: denied { map } for pid=22663 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000005865000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf51004004193ff5aff2b000000000000070000000000", 0x48}], 0x1) 04:04:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 2702.918170] audit: type=1400 audit(2000001856.120:51581): avc: denied { map } for pid=22666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) 04:04:16 executing program 2: 04:04:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8f, 0x0) 04:04:16 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000fe80000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2703.075490] audit: type=1400 audit(2000001856.130:51582): avc: denied { map } for pid=22666 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:17 executing program 2: [ 2703.170005] device lo entered promiscuous mode 04:04:17 executing program 3: 04:04:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041abff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2703.242281] audit: type=1400 audit(2000001856.140:51583): avc: denied { map } for pid=22666 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2703.310473] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.315713] protocol 88fb is buggy, dev hsr_slave_1 04:04:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000081000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2703.362426] audit: type=1400 audit(2000001856.260:51584): avc: denied { map } for pid=22674 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:17 executing program 2: 04:04:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x3f) setsockopt$inet6_buf(r2, 0x29, 0x2d, &(0x7f00000002c0)="3047807659f487fba63bf8b4015bc7db002bb5fb3ae2c795ad1a47350f8305032fa29deef8fe4d3f824cccb825e9dca84510", 0x32) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80004) 04:04:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) 04:04:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041fe935aff2b000000000000070000000000", 0x48}], 0x1) 04:04:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x90, 0x0) 04:04:17 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000fec0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5a932b000000000000070000000000", 0x48}], 0x1) 04:04:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 04:04:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x91, 0x0) 04:04:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000001ac5000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2703.926376] IPVS: ftp: loaded support on port[0] = 21 04:04:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$sndseq(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000100)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) 04:04:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff36000000000000070000000000", 0x48}], 0x1) 04:04:17 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000e0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5affb0000000000000070000000000", 0x48}], 0x1) [ 2704.276943] Option ' ' to dns_resolver key: bad/missing value [ 2704.375398] IPVS: ftp: loaded support on port[0] = 21 04:04:18 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:18 executing program 3: 04:04:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x92, 0x0) 04:04:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000f0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5affec000000000000070000000000", 0x48}], 0x1) 04:04:18 executing program 3: 04:04:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5afff1000000000000070000000000", 0x48}], 0x1) 04:04:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:18 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000fc000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:18 executing program 3: ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) getpid() dup3(r0, r1, 0x0) 04:04:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5afff5000000000000070000000000", 0x48}], 0x1) [ 2704.984419] IPVS: ftp: loaded support on port[0] = 21 04:04:19 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x93, 0x0) 04:04:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000080fe000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5afff8000000000000070000000000", 0x48}], 0x1) 04:04:19 executing program 3: accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x80000) syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_INSTALLED(0xffffffffffffffff, 0x80024322) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000500)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) dup3(r0, r1, 0x0) 04:04:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff80010000000000070000000000", 0x48}], 0x1) 04:04:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000c0fe000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2705.495196] IPVS: ftp: loaded support on port[0] = 21 04:04:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x94, 0x0) 04:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 04:04:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff98020000000000070000000000", 0x48}], 0x1) 04:04:19 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000ff000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5affb0020000000000070000000000", 0x48}], 0x1) 04:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000640)=""/208) 04:04:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff23030000000000070000000000", 0x48}], 0x1) 04:04:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x95, 0x0) 04:04:19 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000001700000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff47030000000000070000000000", 0x48}], 0x1) [ 2706.192704] IPVS: ftp: loaded support on port[0] = 21 04:04:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x96, 0x0) 04:04:20 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:20 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000002000000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000640)=""/208) 04:04:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff50030000000000070000000000", 0x48}], 0x1) 04:04:20 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000003500000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:20 executing program 3: 04:04:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x97, 0x0) 04:04:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff5f030000000000070000000000", 0x48}], 0x1) 04:04:20 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:20 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000034700000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2706.910498] net_ratelimit: 20 callbacks suppressed [ 2706.910505] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.920668] protocol 88fb is buggy, dev hsr_slave_1 04:04:20 executing program 3: [ 2707.159803] kauditd_printk_skb: 201 callbacks suppressed [ 2707.159817] audit: type=1400 audit(2000001860.950:51786): avc: denied { map } for pid=24846 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.279457] audit: type=1400 audit(2000001861.070:51787): avc: denied { map } for pid=24918 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.324364] audit: type=1400 audit(2000001861.100:51788): avc: denied { map } for pid=24918 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.349724] audit: type=1400 audit(2000001861.100:51789): avc: denied { map } for pid=24918 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.381565] audit: type=1400 audit(2000001861.110:51790): avc: denied { map } for pid=24918 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.428946] audit: type=1400 audit(2000001861.220:51791): avc: denied { map } for pid=24938 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.470498] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.475601] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.480932] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.485981] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.505901] IPVS: ftp: loaded support on port[0] = 21 04:04:21 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff66030000000000070000000000", 0x48}], 0x1) 04:04:21 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:21 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000002000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:21 executing program 3: 04:04:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x98, 0x0) 04:04:21 executing program 3: 04:04:21 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5affd4030000000000070000000000", 0x48}], 0x1) 04:04:21 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) [ 2707.800799] audit: type=1400 audit(2000001861.600:51792): avc: denied { map } for pid=24948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2707.950456] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.955634] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.961723] audit: type=1400 audit(2000001861.640:51793): avc: denied { map } for pid=24948 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:21 executing program 3: 04:04:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x99, 0x0) [ 2708.068102] audit: type=1400 audit(2000001861.730:51794): avc: denied { map } for pid=24975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2708.165527] audit: type=1400 audit(2000001861.730:51795): avc: denied { map } for pid=24975 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2708.190540] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.191011] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.603904] IPVS: ftp: loaded support on port[0] = 21 04:04:22 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000004000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5affdd030000000000070000000000", 0x48}], 0x1) 04:04:22 executing program 3: 04:04:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9a, 0x0) 04:04:22 executing program 3: 04:04:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff74040000000000070000000000", 0x48}], 0x1) 04:04:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:22 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000005000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9b, 0x0) 04:04:22 executing program 3: [ 2709.573793] IPVS: ftp: loaded support on port[0] = 21 04:04:23 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b020000000000070000000000", 0x48}], 0x1) 04:04:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000006000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:23 executing program 3: 04:04:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9c, 0x0) 04:04:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:23 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000008000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:23 executing program 3: 04:04:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b040000000000070000000000", 0x48}], 0x1) 04:04:23 executing program 3: 04:04:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9d, 0x0) 04:04:24 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9e, 0x0) 04:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0a0000000000070000000000", 0x48}], 0x1) 04:04:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000009000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:24 executing program 3: 04:04:24 executing program 3: 04:04:24 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000a000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0e0000000000070000000000", 0x48}], 0x1) 04:04:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9f, 0x0) 04:04:24 executing program 3: 04:04:25 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0f0000000000070000000000", 0x48}], 0x1) 04:04:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000b000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:25 executing program 3: 04:04:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa0, 0x0) 04:04:25 executing program 3: 04:04:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b600000000000070000000000", 0x48}], 0x1) 04:04:25 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000c000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa1, 0x0) 04:04:25 executing program 3: [ 2712.110444] net_ratelimit: 18 callbacks suppressed [ 2712.110453] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.120595] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.194114] kauditd_printk_skb: 138 callbacks suppressed [ 2712.194127] audit: type=1400 audit(2000001865.990:51934): avc: denied { map } for pid=26100 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2712.260049] audit: type=1400 audit(2000001866.050:51935): avc: denied { map } for pid=26101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2712.350464] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.350495] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.355602] protocol 88fb is buggy, dev hsr_slave_1 04:04:26 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2be00000000000070000000000", 0x48}], 0x1) 04:04:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000e000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:26 executing program 3: 04:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa2, 0x0) [ 2712.590133] audit: type=1400 audit(2000001866.380:51936): avc: denied { map } for pid=26110 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:26 executing program 3: 04:04:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000000f000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bf00000000000070000000000", 0x48}], 0x1) [ 2712.734037] audit: type=1400 audit(2000001866.470:51937): avc: denied { map } for pid=26116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2712.814873] IPVS: ftp: loaded support on port[0] = 21 04:04:26 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000010000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa3, 0x0) [ 2712.878312] audit: type=1400 audit(2000001866.470:51938): avc: denied { map } for pid=26116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2712.878335] audit: type=1400 audit(2000001866.520:51939): avc: denied { map } for pid=26116 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:27 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:27 executing program 3: 04:04:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b470300000000070000000000", 0x48}], 0x1) 04:04:27 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000060000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2713.143841] audit: type=1400 audit(2000001866.540:51940): avc: denied { map } for pid=26158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.166224] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.166282] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.256495] audit: type=1400 audit(2000001866.540:51941): avc: denied { map } for pid=26158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa4, 0x0) 04:04:27 executing program 3: 04:04:27 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000e0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000a00000000070000000000", 0x48}], 0x1) [ 2713.379540] audit: type=1400 audit(2000001866.590:51942): avc: denied { map } for pid=26141 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:27 executing program 3: [ 2713.555098] audit: type=1400 audit(2000001866.590:51943): avc: denied { map } for pid=26141 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2713.594044] IPVS: ftp: loaded support on port[0] = 21 04:04:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000e00000000070000000000", 0x48}], 0x1) [ 2713.710479] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.715608] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.720788] protocol 88fb is buggy, dev hsr_slave_0 04:04:27 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:27 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000f0000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:27 executing program 3: 04:04:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa5, 0x0) 04:04:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bc00e00000000070000000000", 0x48}], 0x1) 04:04:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:27 executing program 3: 04:04:27 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000fc000b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2714.233886] IPVS: ftp: loaded support on port[0] = 21 04:04:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000f00000000070000000000", 0x48}], 0x1) 04:04:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x100081) r1 = memfd_create(&(0x7f0000000600)='/dev/loop#\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000004) 04:04:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa6, 0x0) 04:04:28 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:28 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000030b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b291b00000000070000000000", 0x48}], 0x1) 04:04:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b1b2900000000070000000000", 0x48}], 0x1) 04:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:28 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000046030b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x7c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000), 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) writev(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfb, 0x15, 0x0, 0x10001, "9ec543894b6a114ec34481d93a03351e"}, 0x15, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f00000003c0)={0x28, 0x0, 0xa20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc0}, 0x4000040) pipe2$9p(0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpriority(0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) 04:04:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa7, 0x0) [ 2714.848055] IPVS: ftp: loaded support on port[0] = 21 04:04:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:28 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000047030b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b034700000000070000000000", 0x48}], 0x1) 04:04:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000050b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:29 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa8, 0x0) 04:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b006000000000070000000000", 0x48}], 0x1) 04:04:29 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x800000022402) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) getpid() r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x400, 0x0, 0x0, {{}, 0x0, 0x800b, 0x0, {0x8}}}, 0x24}}, 0x0) ftruncate(r1, 0x8200) perf_event_open(0x0, 0x0, 0xd, r0, 0x7fffffc) lstat(0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000300)=0x7) setsockopt$inet6_tcp_int(r3, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000400)=0x80000002) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x84) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 04:04:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0ec000000000070000000000", 0x48}], 0x1) 04:04:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000060b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00e000000000070000000000", 0x48}], 0x1) [ 2715.644592] IPVS: ftp: loaded support on port[0] = 21 04:04:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000090b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa9, 0x0) 04:04:29 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000003ee, 0x800008000) 04:04:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00f000000000070000000000", 0x48}], 0x1) 04:04:29 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000a0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0fff00000000070000000000", 0x48}], 0x1) 04:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(0x0, 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000b0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2716.210056] IPVS: ftp: loaded support on port[0] = 21 04:04:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x3f) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000002c0)="3047807659f487fba63bf8b4015bc7db002bb5fb3ae2c795ad1a47350f8305032fa29deef8fe4d3f824cccb825e9dca84510e0017a7a99586150dd6ed0358e60ee72ea7beef6d5ed1ab1c8a2ae35075fe0a5d7d708756cd8901eb7c5b36d595aff5496", 0x63) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80004) 04:04:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xaa, 0x0) 04:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(0x0, 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b004003000000070000000000", 0x48}], 0x1) 04:04:30 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000c0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000e0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(0x0, 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000340000000070000000000", 0x48}], 0x1) 04:04:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xab, 0x0) 04:04:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file1\x00') [ 2716.768566] IPVS: ftp: loaded support on port[0] = 21 04:04:30 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000000f0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b6b6b6b000000070000000000", 0x48}], 0x1) 04:04:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bfffff0000000070000000000", 0x48}], 0x1) 04:04:30 executing program 3: [ 2717.202144] kauditd_printk_skb: 171 callbacks suppressed [ 2717.202158] audit: type=1400 audit(2000001871.000:52115): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.310508] net_ratelimit: 18 callbacks suppressed [ 2717.310517] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.320666] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.321728] audit: type=1400 audit(2000001871.020:52116): avc: denied { map } for pid=27946 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.349033] audit: type=1400 audit(2000001871.030:52117): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.373976] audit: type=1400 audit(2000001871.030:52118): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.404797] audit: type=1400 audit(2000001871.040:52119): avc: denied { map } for pid=27946 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.404823] audit: type=1400 audit(2000001871.050:52120): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:31 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:31 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000c51a0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xac, 0x0) 04:04:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000010000070000000000", 0x48}], 0x1) 04:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:31 executing program 3: [ 2717.404848] audit: type=1400 audit(2000001871.050:52121): avc: denied { map } for pid=27946 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.404870] audit: type=1400 audit(2000001871.060:52122): avc: denied { map } for pid=27946 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2717.404892] audit: type=1400 audit(2000001871.070:52123): avc: denied { map } for pid=27949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000300)={0x0, 0x0, 0x10000}, 0x0, 0x0, &(0x7f0000000400)="c7bca6e0e2ad8000b26d3b") write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/28, 0x1c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x2, 'wlc\x00', 0x0, 0x6}, {@remote, 0x4e21, 0x0, 0x0, 0x96}}, 0x44) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x80000004, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, 0x0) getrandom(0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) 04:04:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000020000070000000000", 0x48}], 0x1) 04:04:31 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000003f0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2717.724955] IPVS: ftp: loaded support on port[0] = 21 [ 2717.759239] audit: type=1400 audit(2000001871.090:52124): avc: denied { map } for pid=27944 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000040000070000000000", 0x48}], 0x1) 04:04:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xad, 0x0) [ 2717.870472] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.875683] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.880886] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.885982] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.980053] cgroup: fork rejected by pids controller in /syz2 [ 2718.350463] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.355603] protocol 88fb is buggy, dev hsr_slave_1 04:04:32 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000a0000070000000000", 0x48}], 0x1) 04:04:32 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003460b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xae, 0x0) 04:04:32 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x61}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = syz_open_dev$vbi(0x0, 0x2, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0x80000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x80000001, 0x0, 0x5, 0xffffffffffffffc1}, 0x98) 04:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000e0000070000000000", 0x48}], 0x1) 04:04:32 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000003470b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2718.590572] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.590662] protocol 88fb is buggy, dev hsr_slave_0 04:04:32 executing program 3: ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x61}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 04:04:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xaf, 0x0) [ 2718.685157] IPVS: ftp: loaded support on port[0] = 21 04:04:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000f0000070000000000", 0x48}], 0x1) 04:04:33 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000065580b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) epoll_create(0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) syz_genetlink_get_family_id$tipc(0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 04:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, 0x0) 04:04:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb0, 0x0) 04:04:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00001b290000070000000000", 0x48}], 0x1) 04:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, 0x0) 04:04:33 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000600b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb1, 0x0) [ 2719.706696] IPVS: ftp: loaded support on port[0] = 21 04:04:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x3b6, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 04:04:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000003470000070000000000", 0x48}], 0x1) 04:04:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:33 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000058650b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, 0x0) 04:04:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb2, 0x0) 04:04:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000600000070000000000", 0x48}], 0x1) 04:04:33 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000fe800b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:34 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB=' '], 0x0, 0x0, 0x0}) 04:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x0, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) [ 2720.275825] IPVS: ftp: loaded support on port[0] = 21 04:04:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b006b6b6b0000070000000000", 0x48}], 0x1) [ 2720.394361] binder: 29256:29258 unknown command 32 04:04:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb3, 0x0) [ 2720.430107] binder: 29256:29258 ioctl c0306201 200002c0 returned -22 04:04:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000810b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x0, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) [ 2720.475505] binder: release 29256:29258 transaction 3 out, still active [ 2720.502766] binder: unexpected work type, 4, not freed [ 2720.529247] binder: undelivered TRANSACTION_COMPLETE [ 2720.752635] binder: send failed reply for transaction 3, target dead 04:04:34 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r0, &(0x7f0000000180)=""/44, 0x2c) 04:04:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bffffff9e0000070000000000", 0x48}], 0x1) 04:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x0, @win={{}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}) 04:04:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000fec00b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb4, 0x0) 04:04:34 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c00000001ac50b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00000ec00000070000000000", 0x48}], 0x1) 04:04:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000202560b700ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000100)={0x1, 0x0, [{0x485}]}) 04:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) [ 2721.123540] IPVS: ftp: loaded support on port[0] = 21 04:04:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb5, 0x0) 04:04:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000e00000070000000000", 0x48}], 0x1) 04:04:35 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:35 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000e00b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 04:04:35 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x100000000002, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x2000000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 04:04:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bfffffff00000070000000000", 0x48}], 0x1) 04:04:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb6, 0x0) 04:04:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 04:04:35 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000f00b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00000fff0000070000000000", 0x48}], 0x1) [ 2721.904665] IPVS: ftp: loaded support on port[0] = 21 04:04:35 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x11, 0xa, 0x0, 0x0) 04:04:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00f0ffff0000070000000000", 0x48}], 0x1) 04:04:35 executing program 4: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000380)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = getpgrp(0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x7, 0x0) setpriority(0x0, r1, 0x10000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x8040, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{}, {0x2}]}, 0x14, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r4) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x2) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000140)=""/98, 0x62, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0x0, 0x1, 0x3}, 0x10) [ 2722.220483] kauditd_printk_skb: 139 callbacks suppressed [ 2722.220496] audit: type=1400 audit(2000001876.010:52264): avc: denied { map } for pid=30130 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:36 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000fc0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb7, 0x0) 04:04:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b9effffff0000070000000000", 0x48}], 0x1) [ 2722.371097] audit: type=1400 audit(2000001876.010:52265): avc: denied { map } for pid=30130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:04:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x48201) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000500)='./bus\x00', 0x200) sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 04:04:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1}, 0x0) [ 2722.490818] audit: type=1400 audit(2000001876.010:52266): avc: denied { map } for pid=30130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2722.520584] net_ratelimit: 20 callbacks suppressed [ 2722.520592] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.530701] protocol 88fb is buggy, dev hsr_slave_1 04:04:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000080fe0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2bf0ffffff0000070000000000", 0x48}], 0x1) [ 2722.681076] audit: type=1400 audit(2000001876.010:52267): avc: denied { map } for pid=30130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2722.750467] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.750500] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.765345] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.811863] IPVS: ftp: loaded support on port[0] = 21 04:04:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) close(r0) pipe(&(0x7f00000002c0)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x1000000000032, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000001100)="83", 0x1}], 0x1, 0x0) 04:04:36 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c0000000c0fe0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2722.847553] audit: type=1400 audit(2000001876.060:52268): avc: denied { create } for pid=30128 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:04:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb8, 0x0) 04:04:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2723.028487] audit: type=1400 audit(2000001876.130:52269): avc: denied { map } for pid=30168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2723.160485] audit: type=1400 audit(2000001876.340:52270): avc: denied { map } for pid=30336 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2723.229368] xt_bpf: check failed: parse error [ 2723.258504] audit: type=1400 audit(2000001876.360:52271): avc: denied { map } for pid=30337 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2723.308768] audit: type=1400 audit(2000001876.360:52272): avc: denied { map } for pid=30337 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2723.350625] audit: type=1400 audit(2000001876.360:52273): avc: denied { map } for pid=30337 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2723.550629] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.555762] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.110496] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.115585] protocol 88fb is buggy, dev hsr_slave_1 [ 2724.120797] protocol 88fb is buggy, dev hsr_slave_0 04:04:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000fff00000000", 0x48}], 0x1) 04:04:39 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000ff0b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r0, &(0x7f0000000080)=""/66, 0x42) 04:04:39 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000100)={{0x105, 0x5, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) 04:04:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb9, 0x0) 04:04:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000003440)='net/mcfilter\x00') readv(r1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/57, 0x39}, {&(0x7f00000010c0)=""/151, 0x97}], 0x2) 04:04:39 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000020000000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000200000000070000000000", 0x48}], 0x1) [ 2725.629780] IPVS: ftp: loaded support on port[0] = 21 04:04:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xba, 0x0) 04:04:39 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000020b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, &(0x7f0000d83ff8)=0x3000000, 0x2008000fffffffe) 04:04:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000400000000070000000000", 0x48}], 0x1) 04:04:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x4800a000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 04:04:39 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000030b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:39 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) mlockall(0x3) 04:04:39 executing program 4: setreuid(0x0, 0xee00) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0xf0, 0x10, 0x501, 0x0, 0x0, {{@in, @in6=@loopback}, {@in6=@dev}, @in6=@mcast1}}, 0xf0}}, 0x0) 04:04:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000a00000000070000000000", 0x48}], 0x1) 04:04:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbb, 0x0) 04:04:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000040b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2726.346609] IPVS: ftp: loaded support on port[0] = 21 04:04:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000e00000000070000000000", 0x48}], 0x1) 04:04:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000050b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) 04:04:40 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup2(r1, r0) 04:04:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbc, 0x0) 04:04:40 executing program 5: r0 = socket(0x400000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="fc00000048000701ac092500090007000aab08000a0000000000e293210001c000000000060b00000100000909000000fa2c1ec28656aaa79b384b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295edbabc7c3f2eeb57d43dd16b176e83df150c3b880f411f46a6b567b47c095387e6e158a1ad0a4f41f0d48f6f0000080548deac270e33429f3794dec896592d69d381873cf1587c612d2e26ce36f071f0c22700"/252, 0xfc) [ 2727.034928] ================================================================== [ 2727.042696] BUG: KASAN: use-after-free in get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.049930] Read of size 8 at addr ffff8880568113c8 by task syz-executor.2/31541 [ 2727.057463] [ 2727.057481] CPU: 1 PID: 31541 Comm: syz-executor.2 Not tainted 4.19.35 #3 [ 2727.066014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2727.075385] Call Trace: [ 2727.077993] dump_stack+0x172/0x1f0 [ 2727.081643] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.086499] print_address_description.cold+0x7c/0x20d [ 2727.091797] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.096645] kasan_report.cold+0x8c/0x2ba [ 2727.100785] __asan_report_load8_noabort+0x14/0x20 [ 2727.105704] get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.110373] mem_cgroup_try_charge+0x238/0x5e0 [ 2727.114947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2727.120479] mcopy_atomic+0x893/0x2600 [ 2727.124369] ? find_held_lock+0x35/0x130 [ 2727.128435] ? mm_alloc_pmd+0x300/0x300 [ 2727.132406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2727.137933] ? _copy_from_user+0xdd/0x150 [ 2727.142076] userfaultfd_ioctl+0x4dd/0x39e0 [ 2727.146452] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 2727.151481] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.156018] ? mark_held_locks+0x100/0x100 [ 2727.160246] ? __might_fault+0x12b/0x1e0 [ 2727.164358] ? find_held_lock+0x35/0x130 [ 2727.168578] ? __fget+0x340/0x540 [ 2727.172023] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.176509] do_vfs_ioctl+0xd6e/0x1390 [ 2727.180408] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.184891] ? do_vfs_ioctl+0xd6e/0x1390 [ 2727.188943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2727.194476] ? selinux_file_ioctl+0x125/0x5e0 [ 2727.198959] ? ioctl_preallocate+0x210/0x210 [ 2727.203357] ? selinux_file_mprotect+0x620/0x620 [ 2727.208108] ? iterate_fd+0x360/0x360 [ 2727.212023] ? nsecs_to_jiffies+0x30/0x30 [ 2727.216174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2727.221734] ? security_file_ioctl+0x93/0xc0 [ 2727.226168] ksys_ioctl+0xab/0xd0 [ 2727.229613] __x64_sys_ioctl+0x73/0xb0 [ 2727.233493] do_syscall_64+0x103/0x610 [ 2727.237379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2727.242562] RIP: 0033:0x458c29 [ 2727.245746] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2727.264641] RSP: 002b:00007f794a5fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2727.272343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 2727.279604] RDX: 0000000020000100 RSI: 00000000c028aa03 RDI: 0000000000000004 [ 2727.286871] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2727.294137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f794a5fc6d4 [ 2727.301395] R13: 00000000004c33dc R14: 00000000004d6878 R15: 00000000ffffffff [ 2727.308671] [ 2727.310286] Allocated by task 31536: [ 2727.313990] save_stack+0x45/0xd0 [ 2727.317440] kasan_kmalloc+0xce/0xf0 [ 2727.321135] kasan_slab_alloc+0xf/0x20 [ 2727.325007] kmem_cache_alloc_node+0x144/0x710 [ 2727.329641] copy_process.part.0+0x1cd5/0x7970 [ 2727.334213] _do_fork+0x257/0xfe0 [ 2727.337655] __x64_sys_clone+0xbf/0x150 [ 2727.341612] do_syscall_64+0x103/0x610 [ 2727.345486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2727.350664] [ 2727.352366] Freed by task 31536: [ 2727.355721] save_stack+0x45/0xd0 [ 2727.359169] __kasan_slab_free+0x102/0x150 [ 2727.363385] kasan_slab_free+0xe/0x10 [ 2727.367176] kmem_cache_free+0x86/0x260 [ 2727.371133] free_task+0xdd/0x120 [ 2727.374567] copy_process.part.0+0x1a07/0x7970 [ 2727.379131] _do_fork+0x257/0xfe0 [ 2727.382579] __x64_sys_clone+0xbf/0x150 [ 2727.386542] do_syscall_64+0x103/0x610 [ 2727.390414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2727.395579] [ 2727.397194] The buggy address belongs to the object at ffff888056810300 [ 2727.397194] which belongs to the cache task_struct(81:syz2) of size 6080 [ 2727.410703] The buggy address is located 4296 bytes inside of [ 2727.410703] 6080-byte region [ffff888056810300, ffff888056811ac0) [ 2727.422745] The buggy address belongs to the page: [ 2727.428661] page:ffffea00015a0400 count:1 mapcount:0 mapping:ffff88808f836240 index:0x0 compound_mapcount: 0 [ 2727.438620] flags: 0x1fffc0000008100(slab|head) [ 2727.443291] raw: 01fffc0000008100 ffffea000285e108 ffffea0002655e08 ffff88808f836240 [ 2727.451163] raw: 0000000000000000 ffff888056810300 0000000100000001 ffff88805cc6e280 [ 2727.459041] page dumped because: kasan: bad access detected [ 2727.464742] page->mem_cgroup:ffff88805cc6e280 [ 2727.469216] [ 2727.470829] Memory state around the buggy address: [ 2727.475745] ffff888056811280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2727.483086] ffff888056811300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2727.490426] >ffff888056811380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2727.497778] ^ [ 2727.503478] ffff888056811400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2727.510831] ffff888056811480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2727.518170] ================================================================== [ 2727.525509] Disabling lock debugging due to kernel taint [ 2727.539460] Kernel panic - not syncing: panic_on_warn set ... [ 2727.539460] [ 2727.546855] CPU: 1 PID: 31541 Comm: syz-executor.2 Tainted: G B 4.19.35 #3 [ 2727.555149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2727.564485] Call Trace: [ 2727.567065] dump_stack+0x172/0x1f0 [ 2727.570678] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.575502] panic+0x263/0x51d [ 2727.578680] ? __warn_printk+0xf3/0xf3 [ 2727.582560] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.587390] ? preempt_schedule+0x4b/0x60 [ 2727.591522] ? ___preempt_schedule+0x16/0x18 [ 2727.595914] ? trace_hardirqs_on+0x5e/0x230 [ 2727.600230] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.605071] kasan_end_report+0x47/0x4f [ 2727.609029] kasan_report.cold+0xa9/0x2ba [ 2727.613186] __asan_report_load8_noabort+0x14/0x20 [ 2727.618100] get_mem_cgroup_from_mm+0x28f/0x2b0 [ 2727.622755] mem_cgroup_try_charge+0x238/0x5e0 [ 2727.627325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2727.632847] mcopy_atomic+0x893/0x2600 [ 2727.636727] ? find_held_lock+0x35/0x130 [ 2727.640778] ? mm_alloc_pmd+0x300/0x300 [ 2727.644738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2727.650257] ? _copy_from_user+0xdd/0x150 [ 2727.654393] userfaultfd_ioctl+0x4dd/0x39e0 [ 2727.658697] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 2727.663800] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.668285] ? mark_held_locks+0x100/0x100 [ 2727.672505] ? __might_fault+0x12b/0x1e0 [ 2727.676554] ? find_held_lock+0x35/0x130 [ 2727.680597] ? __fget+0x340/0x540 [ 2727.684034] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.688524] do_vfs_ioctl+0xd6e/0x1390 [ 2727.692401] ? userfaultfd_read+0x18c0/0x18c0 [ 2727.696878] ? do_vfs_ioctl+0xd6e/0x1390 [ 2727.700928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2727.706448] ? selinux_file_ioctl+0x125/0x5e0 [ 2727.710929] ? ioctl_preallocate+0x210/0x210 [ 2727.715319] ? selinux_file_mprotect+0x620/0x620 [ 2727.720062] ? iterate_fd+0x360/0x360 [ 2727.723866] ? nsecs_to_jiffies+0x30/0x30 [ 2727.728000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2727.733520] ? security_file_ioctl+0x93/0xc0 [ 2727.737914] ksys_ioctl+0xab/0xd0 [ 2727.741352] __x64_sys_ioctl+0x73/0xb0 [ 2727.745230] do_syscall_64+0x103/0x610 [ 2727.749106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2727.754300] RIP: 0033:0x458c29 [ 2727.757483] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2727.776369] RSP: 002b:00007f794a5fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2727.784059] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 2727.791312] RDX: 0000000020000100 RSI: 00000000c028aa03 RDI: 0000000000000004 [ 2727.798568] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2727.805912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f794a5fc6d4 [ 2727.813192] R13: 00000000004c33dc R14: 00000000004d6878 R15: 00000000ffffffff [ 2727.821647] Kernel Offset: disabled [ 2727.825283] Rebooting in 86400 seconds..