E(r1, 0x8040552c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10b, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000040), 0x0, 0x1}, 0x20) unlink(&(0x7f0000000900)='./file0/file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000000140)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000040)='GPL\x009\xe7v4\xfe\xba\xccHA\xb2\xddC\x93\xb0J\x04\xf4\xca\x9a\xfdz\x8a\xbcDi\x85\xdb\r\xc3s\x0f^\x06o\x14i0C\x03D){\xa6\xa4\xbe\xba\x96c\x17]\xf0Uf\xc6', 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000780)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ec630000"], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) r5 = dup(r4) shutdown(r5, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='/group.stat\x00') syz_open_dev$binder(&(0x7f0000000880)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="bbfbffff", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000780)}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000003c0)={0xe, 0x0, &(0x7f0000000680)=[@acquire_done], 0xfffffffffffffeb3, 0x0, &(0x7f00000007c0)}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000040)=[{&(0x7f0000008500)="000100000200000000000000c9030000ec000000010000000200000000000000002000400020000000010000000000006e5fbe5a00000b0053ef", 0x3a, 0x400}], 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f00000000c0)={'ipddp0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 03:38:01 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:01 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) 03:38:01 executing program 3: syz_emit_ethernet(0x115, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x107, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d0"}}}}}, 0x0) 03:38:01 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0x115, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x107, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d0"}}}}}, 0x0) 03:38:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) 03:38:01 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1986.118908] kauditd_printk_skb: 73 callbacks suppressed [ 1986.118916] audit: type=1400 audit(2000000281.310:59498): avc: denied { map_create } for pid=9884 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1986.298853] audit: type=1400 audit(2000000281.480:59499): avc: denied { prog_load } for pid=9884 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:01 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0x13c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x12e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:01 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 1986.538242] audit: type=1400 audit(2000000281.730:59500): avc: denied { map_create } for pid=9884 comm="/group.stat" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1986.634875] audit: type=1400 audit(2000000281.780:59501): avc: denied { prog_load } for pid=9884 comm="/group.stat" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:01 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x4020) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0x1f, 0x0, 0x791a, 0x1ff, 0x208447c5, 0xfffffffffffffffd}) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x54, 0x6, 0xfc, {0x400, 0x4}, {0xa0, 0x1c98}, @rumble={0xffffffffffff4dd5, 0xb54d}}) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ptrace$cont(0x9, r0, 0x2, 0xffffffffffffffe0) 03:38:04 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:04 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080), 0x100000000000037c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x6, 0x1, 0x594e, 0x2, 0x0, 0x5, 0x40088, 0x8, 0xfffffffffffffff7, 0x1, 0xff, 0x2, 0x7fff, 0x20, 0x6, 0x3, 0x100, 0x4, 0x2, 0x4, 0x9, 0x1, 0xfffffffffffffff9, 0x40, 0x0, 0x2, 0x81, 0xbd9, 0x4, 0x80000000, 0x20, 0x4, 0x7fffffff, 0x6, 0xfffffffffffffffa, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x20, 0x7ff}, 0x20400, 0x1, 0x8, 0x0, 0xc0, 0x7, 0x1}, r2, 0x3, r1, 0x1) 03:38:04 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 03:38:04 executing program 3: syz_emit_ethernet(0x13c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x12e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:04 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 03:38:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) dup3(r1, r0, 0x0) 03:38:04 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 03:38:05 executing program 3: syz_emit_ethernet(0x13c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x12e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77"}}}}}, 0x0) 03:38:05 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x7) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700000000000700ff3f03000000450001070000001419001a000400021007000600000001ab09000000d400000000", 0x39}], 0x1) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10200091}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xa0, 0x3d, 0x200, 0x70bd2d, 0x25dfdbfe, {0x9}, [@nested={0x8c, 0x4, [@typed={0x8, 0x3d, @uid=r1}, @generic, @generic="b4169cff08f9f882c7cd551372b65d82c6af41ae214057b33a45aa55d1b69dbb81e131276b2b5b60dc710cf333c17672f1a96b29645e5a33126d67d2a7974599daaa74e2282ece07ca3cf1d65a92ee75939815a67de660846d0892e1f4e17f794d8722a70ac6", @generic="7400b0747fea0e", @generic="f91a73410a638a01c3408daae6ad75af"]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x8080) 03:38:05 executing program 3: syz_emit_ethernet(0x150, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x142, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) [ 1990.226394] audit: type=1400 audit(2000000285.420:59502): avc: denied { map } for pid=9930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:05 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) [ 1990.305267] audit: type=1400 audit(2000000285.420:59503): avc: denied { map } for pid=9930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.420144] audit: type=1400 audit(2000000285.450:59504): avc: denied { map } for pid=9930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.510136] audit: type=1400 audit(2000000285.460:59505): avc: denied { map } for pid=9930 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.574233] audit: type=1400 audit(2000000285.500:59506): avc: denied { map } for pid=9930 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.617205] audit: type=1400 audit(2000000285.500:59507): avc: denied { map } for pid=9930 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:06 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:06 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000000)) 03:38:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = dup(0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000200)='[trusted$\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) finit_module(r1, 0x0, 0x1) sendfile(r0, r2, 0x0, 0x20000102000007) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) 03:38:06 executing program 3: syz_emit_ethernet(0x150, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x142, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:06 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) io_setup(0x100000001, &(0x7f0000000040)=0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mkdirat(r0, &(0x7f0000000080)='./file1\x00', 0x20) [ 1991.551614] kauditd_printk_skb: 5 callbacks suppressed [ 1991.551623] audit: type=1400 audit(2000000286.750:59513): avc: denied { map } for pid=9960 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.611026] audit: type=1400 audit(2000000286.750:59514): avc: denied { map } for pid=9960 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.641897] audit: type=1400 audit(2000000286.750:59515): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.665981] audit: type=1400 audit(2000000286.780:59516): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.691105] audit: type=1400 audit(2000000286.790:59517): avc: denied { map } for pid=9960 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.713629] audit: type=1400 audit(2000000286.800:59518): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.741238] audit: type=1400 audit(2000000286.810:59519): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.771592] audit: type=1400 audit(2000000286.810:59520): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.795734] audit: type=1400 audit(2000000286.810:59521): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.821195] audit: type=1400 audit(2000000286.840:59522): avc: denied { map } for pid=9960 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:08 executing program 3: syz_emit_ethernet(0x150, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x142, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54"}}}}}, 0x0) 03:38:08 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:08 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:08 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x1000, 0x3, &(0x7f0000009000/0x1000)=nil) pipe(&(0x7f0000000280)) 03:38:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000240)='net/anycast6\x00') 03:38:08 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:08 executing program 3: syz_emit_ethernet(0x15a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:08 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xee, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x504) 03:38:08 executing program 3: syz_emit_ethernet(0x15a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818"}}}}}, 0x0) 03:38:08 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:11 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:11 executing program 3: syz_emit_ethernet(0x15a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818"}}}}}, 0x0) 03:38:11 executing program 4: syz_emit_ethernet(0xc7, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c"}}}}}, 0x0) 03:38:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", 0x0, 0x69}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 03:38:11 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:11 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:38:11 executing program 3: syz_emit_ethernet(0x15f, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x151, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", 0x0, 0x69}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 03:38:11 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:38:12 executing program 3: syz_emit_ethernet(0x15f, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x151, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:12 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) [ 1996.995158] kauditd_printk_skb: 43 callbacks suppressed [ 1996.995166] audit: type=1400 audit(2000000292.180:59566): avc: denied { prog_load } for pid=10020 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1997.080139] audit: type=1400 audit(2000000292.270:59567): avc: denied { prog_load } for pid=10020 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1997.561730] audit: type=1400 audit(2000000292.760:59568): avc: denied { map } for pid=10034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.583993] audit: type=1400 audit(2000000292.760:59569): avc: denied { map } for pid=10034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.608260] audit: type=1400 audit(2000000292.760:59570): avc: denied { map } for pid=10034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.633539] audit: type=1400 audit(2000000292.760:59571): avc: denied { map } for pid=10034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.659112] audit: type=1400 audit(2000000292.790:59572): avc: denied { map } for pid=10034 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.681716] audit: type=1400 audit(2000000292.790:59573): avc: denied { map } for pid=10034 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.707869] audit: type=1400 audit(2000000292.790:59574): avc: denied { map } for pid=10034 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1997.732554] audit: type=1400 audit(2000000292.810:59575): avc: denied { map } for pid=10034 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:14 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:14 executing program 3: syz_emit_ethernet(0x15f, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x151, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:14 executing program 4: syz_emit_ethernet(0x79, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62"}}}}}, 0x0) 03:38:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", 0x0, 0x69}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 03:38:14 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:14 executing program 3: syz_emit_ethernet(0x161, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x153, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:14 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:38:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x5, 0x1, 0x2}, 0x1ee) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140)="01", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), 0x0}, 0x20) 03:38:14 executing program 3: syz_emit_ethernet(0x161, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x153, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:15 executing program 3: syz_emit_ethernet(0x161, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x153, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:38:15 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:38:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:18 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:38:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) 03:38:18 executing program 3: syz_emit_ethernet(0x162, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x154, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785"}}}}}, 0x0) 03:38:18 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:18 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a1"}}}}}, 0x0) [ 2002.952683] kauditd_printk_skb: 17 callbacks suppressed [ 2002.952711] audit: type=1400 audit(2000000298.150:59593): avc: denied { prog_load } for pid=10066 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:18 executing program 3: syz_emit_ethernet(0x162, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x154, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) [ 2003.033571] audit: type=1400 audit(2000000298.190:59594): avc: denied { prog_load } for pid=10066 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", 0x0, 0x69}, 0x28) 03:38:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:18 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2003.419181] audit: type=1400 audit(2000000298.610:59595): avc: denied { prog_load } for pid=10080 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:18 executing program 3: syz_emit_ethernet(0x162, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x154, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) [ 2003.505440] audit: type=1400 audit(2000000298.700:59596): avc: denied { prog_load } for pid=10080 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) close(r0) 03:38:19 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:19 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:38:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", 0x0, 0x69}, 0x28) [ 2004.052373] audit: type=1400 audit(2000000299.250:59597): avc: denied { prog_load } for pid=10099 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2004.186665] audit: type=1400 audit(2000000299.380:59598): avc: denied { prog_run } for pid=10099 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2004.246405] audit: type=1400 audit(2000000299.410:59599): avc: denied { prog_load } for pid=10099 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2004.284674] audit: type=1400 audit(2000000299.410:59600): avc: denied { prog_run } for pid=10099 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2004.444201] audit: type=1400 audit(2000000299.620:59601): avc: denied { prog_load } for pid=10104 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:19 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:19 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) tee(r1, r1, 0x1, 0x9) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000240)="624bbaa22fa18b3d91185fb6a35c", 0x0, 0x2}, 0x28) 03:38:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:19 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:38:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x1, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400009520c8c300"], 0x0, 0x3}, 0x48) 03:38:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) dup2(r1, r0) [ 2004.755777] audit: type=1400 audit(2000000299.950:59602): avc: denied { prog_load } for pid=10116 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:20 executing program 4: syz_emit_ethernet(0x3f, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6"}}}}}, 0x0) 03:38:20 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) 03:38:20 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xeff95cfda729d37, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:38:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 03:38:22 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:22 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:22 executing program 0: inotify_init1(0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 03:38:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="624bbaa22fa18b3d91185fb6a35c", 0x0, 0x2}, 0x28) 03:38:23 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000001500)={0x400000000000001, 'syz_tun\x00'}, 0x18) 03:38:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a"}}}}}, 0x0) 03:38:23 executing program 2: add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 03:38:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:24 executing program 0: inotify_init1(0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:24 executing program 2: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x33f, &(0x7f00000003c0)) io_setup(0x4, &(0x7f0000000400)) io_setup(0x2, &(0x7f00000004c0)) io_setup(0x100000001, &(0x7f0000000500)) 03:38:24 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:24 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:24 executing program 2: 03:38:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) [ 2009.524075] kauditd_printk_skb: 20 callbacks suppressed [ 2009.524096] audit: type=1400 audit(2000000304.720:59623): avc: denied { map } for pid=10196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.551831] audit: type=1400 audit(2000000304.730:59624): avc: denied { map } for pid=10196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.574530] audit: type=1400 audit(2000000304.730:59625): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.598487] audit: type=1400 audit(2000000304.730:59626): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.622547] audit: type=1400 audit(2000000304.740:59627): avc: denied { map } for pid=10196 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.645161] audit: type=1400 audit(2000000304.750:59628): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.669756] audit: type=1400 audit(2000000304.750:59629): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.694343] audit: type=1400 audit(2000000304.760:59630): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.718513] audit: type=1400 audit(2000000304.760:59631): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2009.742665] audit: type=1400 audit(2000000304.770:59632): avc: denied { map } for pid=10196 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:26 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:26 executing program 2: 03:38:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) dup2(r0, r1) 03:38:26 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:26 executing program 0: inotify_init1(0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:26 executing program 2: 03:38:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) dup2(r0, r1) 03:38:26 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b"}}}}}, 0x0) 03:38:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) dup2(r0, r1) 03:38:26 executing program 2: 03:38:27 executing program 2: 03:38:29 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:29 executing program 4: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:38:29 executing program 2: 03:38:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:29 executing program 2: 03:38:29 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:38:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:30 executing program 2: 03:38:30 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:38:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2015.647551] kauditd_printk_skb: 23 callbacks suppressed [ 2015.647560] audit: type=1400 audit(2000000310.840:59656): avc: denied { map } for pid=10250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.700746] audit: type=1400 audit(2000000310.840:59657): avc: denied { map } for pid=10250 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.749596] audit: type=1400 audit(2000000310.860:59658): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.773946] audit: type=1400 audit(2000000310.860:59659): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.800195] audit: type=1400 audit(2000000310.860:59660): avc: denied { map } for pid=10250 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.823277] audit: type=1400 audit(2000000310.860:59661): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.850071] audit: type=1400 audit(2000000310.860:59662): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.874798] audit: type=1400 audit(2000000310.880:59663): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.900504] audit: type=1400 audit(2000000310.880:59664): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2015.924789] audit: type=1400 audit(2000000310.890:59665): avc: denied { map } for pid=10250 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:32 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:32 executing program 2: 03:38:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:32 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:38:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:33 executing program 2: 03:38:33 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:33 executing program 3: r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:33 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:33 executing program 2: 03:38:33 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:33 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:33 executing program 3: r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:33 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:38:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:34 executing program 4: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:38:34 executing program 2: 03:38:34 executing program 3: r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:34 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:38:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:34 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:34 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:38:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1}, 0x10) 03:38:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:34 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:34 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:35 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') close(r2) creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr(r2, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0xfe9, 0x0) 03:38:35 executing program 4: syz_emit_ethernet(0x2d, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000"}}}}}, 0x0) 03:38:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:35 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r1, 0xff, 0x1, 0x0, 0xff08) 03:38:35 executing program 4: getrandom(0x0, 0xfffffec6, 0x8000000000000002) 03:38:35 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2020.682138] kauditd_printk_skb: 26 callbacks suppressed [ 2020.682148] audit: type=1400 audit(2000000315.870:59692): avc: denied { map } for pid=10333 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2020.784070] audit: type=1400 audit(2000000315.930:59693): avc: denied { map } for pid=10333 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0x0, 0x0) [ 2020.892533] audit: type=1400 audit(2000000316.010:59694): avc: denied { map } for pid=10333 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) [ 2020.988486] audit: type=1400 audit(2000000316.010:59695): avc: denied { map } for pid=10333 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2021.219658] audit: type=1400 audit(2000000316.410:59696): avc: denied { map } for pid=10349 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2021.278256] audit: type=1400 audit(2000000316.440:59697): avc: denied { map } for pid=10349 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2021.326297] audit: type=1400 audit(2000000316.450:59698): avc: denied { map } for pid=10349 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2021.379545] audit: type=1400 audit(2000000316.460:59699): avc: denied { map } for pid=10349 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2021.460158] audit: type=1400 audit(2000000316.470:59700): avc: denied { map } for pid=10349 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2021.507447] audit: type=1400 audit(2000000316.500:59701): avc: denied { map } for pid=10349 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:37 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:37 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 03:38:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x0, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:37 executing program 4: 03:38:37 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:37 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000400000000400000000000000000000035570007efa973c914f53b380002"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 03:38:37 executing program 4: 03:38:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x0, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:37 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:37 executing program 2: 03:38:37 executing program 4: 03:38:38 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x0, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:38 executing program 2: 03:38:38 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:38 executing program 4: 03:38:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:38 executing program 2: 03:38:38 executing program 4: 03:38:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:38 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:39 executing program 0: inotify_init1(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:39 executing program 4: 03:38:39 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:39 executing program 2: 03:38:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:39 executing program 2: 03:38:39 executing program 4: 03:38:39 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:39 executing program 2: 03:38:39 executing program 4: 03:38:40 executing program 0: inotify_init1(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:38:40 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:40 executing program 2: 03:38:40 executing program 4: 03:38:40 executing program 4: 03:38:40 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:40 executing program 2: 03:38:40 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 03:38:41 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2026.481963] kauditd_printk_skb: 105 callbacks suppressed [ 2026.481973] audit: type=1400 audit(2000000321.680:59807): avc: denied { map } for pid=10477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.551044] audit: type=1400 audit(2000000321.680:59808): avc: denied { map } for pid=10477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.600145] audit: type=1400 audit(2000000321.680:59809): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.660127] audit: type=1400 audit(2000000321.680:59810): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.717286] audit: type=1400 audit(2000000321.680:59811): avc: denied { map } for pid=10477 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.746445] audit: type=1400 audit(2000000321.680:59812): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.771037] audit: type=1400 audit(2000000321.680:59813): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.800465] audit: type=1400 audit(2000000321.680:59814): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.829128] audit: type=1400 audit(2000000321.710:59815): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.854850] audit: type=1400 audit(2000000321.710:59816): avc: denied { map } for pid=10477 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) inotify_init() perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:38:42 executing program 0: inotify_init1(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:38:42 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) 03:38:42 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:42 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:42 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:42 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:38:42 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) 03:38:43 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) 03:38:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 03:38:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, 0x1c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000018, 0x0, &(0x7f0000000040)) 03:38:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000200)='./file0\x00', 0x0, 0x1000, 0x0) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) 03:38:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 03:38:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:38:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 03:38:45 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 03:38:45 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f00000000c0), 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 03:38:45 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00\x00\x80\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="3b000000020000000032"]}) 03:38:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 03:38:45 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) 03:38:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 03:38:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x0}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000180)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 03:38:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f0000000100), 0x780) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r0, &(0x7f000000b8c0)={0x0, 0x0, 0x0, 0x0, &(0x7f000000a8c0)=""/4096, 0x1000}, 0x0) sendmsg(r0, 0x0, 0x0) 03:38:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x200}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000100)={0xd, 0x6, 0x4, 0xfdf, 0x0, r0, 0x0, [0x305f, 0xa]}, 0x2c) [ 2031.606061] kauditd_printk_skb: 62 callbacks suppressed [ 2031.606069] audit: type=1400 audit(2000000326.800:59879): avc: denied { map_create } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.639147] audit: type=1400 audit(2000000326.820:59880): avc: denied { map_read map_write } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.667252] audit: type=1400 audit(2000000326.840:59881): avc: denied { map_create } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.692608] audit: type=1400 audit(2000000326.870:59882): avc: denied { map_create } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.717978] audit: type=1400 audit(2000000326.870:59883): avc: denied { map_read map_write } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.741869] audit: type=1400 audit(2000000326.890:59884): avc: denied { map_create } for pid=10588 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2031.898767] audit: type=1400 audit(2000000327.090:59885): avc: denied { map } for pid=10591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2031.921415] audit: type=1400 audit(2000000327.090:59886): avc: denied { map } for pid=10591 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2031.945722] audit: type=1400 audit(2000000327.090:59887): avc: denied { map } for pid=10591 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2031.969959] audit: type=1400 audit(2000000327.090:59888): avc: denied { map } for pid=10591 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 03:38:49 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x8000001, @multicast1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x5f, 0x0) 03:38:49 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) 03:38:49 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x20000000007) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007d80), 0x6, 0x0) 03:38:49 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f00000000c0), 0x4) close(r1) 03:38:49 executing program 4: r0 = socket$inet6(0x10, 0x803, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="550000001e007f5300fe01b2a4a20006000000a809000c0000055e580e1a02ca4f8922f6dc9b1313380900000006000000f75afb83de448daa7227c43ab8221000060cec4fab91d400000000000000000048000093", 0x55}], 0x1}, 0x0) read(r0, &(0x7f0000000180)=""/239, 0xef) 03:38:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 03:38:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2034.522393] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2034.573515] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. 03:38:49 executing program 4: r0 = socket$inet6(0x10, 0x803, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="550000001e007f5300fe01b2a4a20006000000a809000c0000055e580e1a02ca4f8922f6dc9b1313380900000006000000f75afb83de448daa7227c43ab8221000060cec4fab91d400000000000000000048000093", 0x55}], 0x1}, 0x0) read(r0, &(0x7f0000000180)=""/239, 0xef) 03:38:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3b) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f00000000c0)="9c", 0x1}], 0x1}, 0xbd}], 0x1, 0x0) [ 2034.831123] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2034.852498] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.4'. 03:38:50 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f00004c3000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 03:38:50 executing program 2: 03:38:50 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:38:50 executing program 4: 03:38:52 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:52 executing program 4: 03:38:52 executing program 2: 03:38:52 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:38:52 executing program 3: [ 2037.705597] kauditd_printk_skb: 73 callbacks suppressed [ 2037.705606] audit: type=1400 audit(2000000332.900:59962): avc: denied { map } for pid=10649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2037.733440] audit: type=1400 audit(2000000332.900:59963): avc: denied { map } for pid=10649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2037.757379] audit: type=1400 audit(2000000332.910:59964): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2037.781403] audit: type=1400 audit(2000000332.910:59965): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000280)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000010005, 0xe) 03:38:53 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:38:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) dup3(r0, r1, 0x0) 03:38:53 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:53 executing program 4: [ 2037.893514] audit: type=1400 audit(2000000332.930:59966): avc: denied { map } for pid=10649 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchmod(r0, 0x0) [ 2037.957444] audit: type=1400 audit(2000000332.940:59967): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x0, @initdev, 0x0, 0x0, 'dh\x00'}, {@multicast2}}, 0x44) [ 2038.045462] audit: type=1400 audit(2000000332.940:59968): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2038.130139] audit: type=1400 audit(2000000332.950:59969): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2038.204200] audit: type=1400 audit(2000000332.970:59970): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2038.254475] audit: type=1400 audit(2000000333.010:59971): avc: denied { map } for pid=10649 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) 03:38:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) 03:38:53 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(r0, 0x4, 0x42803) 03:38:53 executing program 3: bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) 03:38:53 executing program 4: sysinfo(&(0x7f0000002200)=""/4096) 03:38:54 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(r0, 0x4, 0x42803) 03:38:54 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:38:54 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(r0, 0x4, 0x42803) 03:38:56 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)) 03:38:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002780)=@can_newroute={0x1c, 0x18, 0x301, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x8}]}, 0x1c}}, 0x0) 03:38:56 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0, 0x9, 0xf5}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'sha224-generic\x00'}}, &(0x7f00000001c0)="29f03e8bf98ec70983f346ebca0b7529a3623d99bd8df48a46d4345cf4bf", 0x0) 03:38:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:56 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:38:56 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000280)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000010005, 0x0) 03:38:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000200)='[trusted$\x00', 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) 03:38:56 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x8032, 0xffffffffffffffff, 0x0) 03:38:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x1, 0x0) 03:38:56 executing program 4: futex(0x0, 0x89, 0x0, 0x0, 0x0, 0xffffffffffffffff) 03:38:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x2000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup2(r1, r0) 03:38:59 executing program 2: 03:38:59 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:38:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:59 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:38:59 executing program 3: 03:38:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 03:38:59 executing program 3: 03:38:59 executing program 2: 03:38:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:38:59 executing program 4: 03:38:59 executing program 4: 03:38:59 executing program 2: timer_create(0x1, &(0x7f0000000080)={0x0, 0x0, 0x1}, 0x0) timer_gettime(0x0, &(0x7f0000000100)) 03:38:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = dup(r0) sendmsg$netlink(r1, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=[@cred={0x18}], 0x18}, 0x0) [ 2045.036904] kauditd_printk_skb: 27 callbacks suppressed [ 2045.036913] audit: type=1400 audit(2000000340.230:59999): avc: denied { map } for pid=10758 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.064620] audit: type=1400 audit(2000000340.230:60000): avc: denied { map } for pid=10758 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.088981] audit: type=1400 audit(2000000340.250:60001): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.112984] audit: type=1400 audit(2000000340.250:60002): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.138590] audit: type=1400 audit(2000000340.270:60003): avc: denied { map } for pid=10758 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.162157] audit: type=1400 audit(2000000340.270:60004): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.188153] audit: type=1400 audit(2000000340.270:60005): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.212799] audit: type=1400 audit(2000000340.290:60006): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.238418] audit: type=1400 audit(2000000340.290:60007): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2045.262560] audit: type=1400 audit(2000000340.320:60008): avc: denied { map } for pid=10758 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:02 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:02 executing program 4: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/54, 0x36}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCXONC(r1, 0x540a, 0x2) tkill(r0, 0x1000000000016) 03:39:02 executing program 2: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00007c4000)) clone(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000140), &(0x7f0000000080)) wait4(0x0, 0x0, 0x80000080000000, &(0x7f0000000200)) wait4(0x0, &(0x7f0000000100), 0x40000002, 0x0) 03:39:02 executing program 0: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) 03:39:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:02 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:02 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:02 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:02 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:03 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:03 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:05 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 03:39:05 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:05 executing program 0: r0 = inotify_init1(0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/225, 0xe1}, {&(0x7f00000002c0)=""/127, 0x7f}], 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)=0x7) 03:39:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0xc, 0x5, 0xffffffffffffffff) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:05 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 03:39:05 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 03:39:05 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 03:39:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2050.842483] kauditd_printk_skb: 50 callbacks suppressed [ 2050.842492] audit: type=1400 audit(2000000346.040:60059): avc: denied { map } for pid=10808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 2050.931851] audit: type=1400 audit(2000000346.070:60060): avc: denied { map } for pid=10808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.020200] audit: type=1400 audit(2000000346.070:60061): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.084566] audit: type=1400 audit(2000000346.090:60062): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 2051.132865] audit: type=1400 audit(2000000346.120:60063): avc: denied { map } for pid=10808 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 4: r0 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='/dev/rtc0\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rtc0\x00', 0x200080, 0x0) syz_open_pts(r3, 0x10000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff798a, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080)="9385cae7d09793589b4306093260c545d8e2983593e1adb5e4e175c2aef5d052729f9978d8e5a284e1dcd43f3af35ee222cc9a07fb262f8ac7797a405ab6d92b953dd3dea54c07a90f3e79b21474b28431be62a58bedaa433ef8fe2c2da9b2b1c2caa3adfefa33d661e5eec7f92341ad2be66f08fb36e49358e85fd143aab16f72", 0x81, 0xffffffff00000000}, {&(0x7f0000000140)="eeffe3f29d8ce5ce9d45e5c5bca3db974ce0ebb428421271c7eaabef87d3c4fec942f6", 0x23, 0x7}, {&(0x7f0000000180)="1320c06244535f8c590c0d93d674a73c27a524ee4ca05a0a54f052cfb10dfbfe5634a5ac2c", 0x25, 0xff}, {&(0x7f00000001c0)="8bdf22aaf3cff8186d9b2ea7a221270feb1b5f", 0x13, 0xfffffffffffffffa}, {&(0x7f0000000200)="d0230bb4e0cd02ff57ca4693c55f69c2ed0c5c6c2b75fb71f6db0a28e73e80db1131cf0ba7f17d3de65099f6a475d4a1f635e5f864e5f06c3e474276f32d441c20c987809fd845fb2a11f2dd01954aae4d6072ca17bc34080c8a09ac908d1e07d7e557e170cdae4cdd190bb8d30667a4db27570ceaba097adbdad4ad984ff589d585173dc7b12705405a74d7fdc3472ea40728", 0x93, 0x3ff}, {&(0x7f00000002c0)="bc34a4647a846c12470b37cd70fc127a4930759bc91ad8599f4c3d13d63deff21aef49b8a4a6485c25e3cc42661ae129d8b3504c2a214732ae23cedbc261b95bb91458dbfbf4b6f052bcf27e290516761ef1442dc5ab96e063c007084bd745f5a22592f26b61dcc9212578b90481b853d94bdd19e5ee6bf3a5756722c1e7f4afd31725b4e7ce4649495da8f0ff2184778b1d33ee436e8ae01f8312c2ecab3c27da18b54af7a6adb1b2ec5126b62b14eafa6e864e4fb43cbe7909c414a02b0e1113ed64992fe1", 0xc6, 0x80000001}, {&(0x7f00000003c0)="10b5c2eee34cb0c7f01703af5c02c1fa817b82fb37f74ec6f184c3a0acffbdb7a9ecd243546bf752b144c2d7569007d3ef17577a205a3944fc1a10dd65f6a8860d79d1a857e8ac43cfb8d3f8e211aff411a677d9274d8ce57b079e4671e93822deb914138b66d08db7652019b1d5be0341fa1b5d02bc9c346986c4503fa0d98cdc4ab8f84a7888d9858e98a2b83acde1adc2feddf85507bd08a84e6bf7901f9c44bfe51bdcdf7e6336404738997a67c60cb265a4e92779c4e09be29c0c47af34950ade6c1506b680544448b3dc96", 0xce, 0x1}], 0x84400, &(0x7f0000000600)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c6e6e6f6e756d7461696c3d312c6e6e6f6e756d7461696c3d312c757466383d302c6e6f6e756d7461696c3d302c73686f72746e616d653d77696e39352c756e695f786c6174653d302c6e6e6f6e756d7461696c3d312c73686f72746e616d653d77696e39352c73686f72746e616d653d77696e6e742c686173682c64ef6e745f6d6561737572652c666f776e65723d", @ANYRESDEC=r2, @ANYBLOB=',appraise_type=im@sig,\x00']) r4 = socket(0x10, 0x3, 0x2) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000a00)='./file0\x00') connect(r4, &(0x7f0000000700)=@isdn={0x22, 0x9, 0x3, 0x2, 0x10000}, 0x80) dup2(r1, r4) [ 2051.166580] audit: type=1400 audit(2000000346.200:60064): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.230804] audit: type=1400 audit(2000000346.200:60065): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.258405] audit: type=1400 audit(2000000346.250:60066): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2051.307609] audit: type=1400 audit(2000000346.250:60067): avc: denied { map } for pid=10808 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.803745] audit: type=1400 audit(2000000347.000:60068): avc: denied { map } for pid=10833 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:08 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:08 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:08 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000000)=0x2, 0x4) 03:39:08 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000002680)=[{&(0x7f0000000040)=""/206}, {&(0x7f00000002c0)=""/228}, {&(0x7f0000002700)=""/4096}, {&(0x7f00000013c0)=""/248}, {&(0x7f00000014c0)=""/206}, {&(0x7f00000015c0)=""/173}, {&(0x7f0000001680)=""/4096}, {&(0x7f0000000140)=""/54}], 0x10000000000001ef, 0x0) 03:39:09 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0xd185) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:09 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffff9c) dup2(r0, r1) personality(0x600000f) 03:39:09 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) [ 2056.059313] kauditd_printk_skb: 21 callbacks suppressed [ 2056.059335] audit: type=1400 audit(2000000351.250:60090): avc: denied { map } for pid=10866 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.087811] audit: type=1400 audit(2000000351.270:60091): avc: denied { map } for pid=10866 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.112360] audit: type=1400 audit(2000000351.280:60092): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.136573] audit: type=1400 audit(2000000351.280:60093): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.190113] audit: type=1400 audit(2000000351.300:60094): avc: denied { map } for pid=10866 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.230175] audit: type=1400 audit(2000000351.310:60095): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.254657] audit: type=1400 audit(2000000351.310:60096): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.281097] audit: type=1400 audit(2000000351.330:60097): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.305374] audit: type=1400 audit(2000000351.330:60098): avc: denied { map } for pid=10866 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.331623] audit: type=1400 audit(2000000351.370:60099): avc: denied { map } for pid=10867 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:12 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:12 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x10000000000056, 0x1, 0x7}}, 0x14) inotify_init1(0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000002c0)={0x6, 0xaac8, 0xffffffffffffffff, 0x0, 0x2}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) 03:39:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x9, 0x3, 0x5) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:12 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:12 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:12 executing program 4: r0 = dup(0xffffffffffffff9c) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@mpls_newroute={0x44, 0x18, 0x400, 0x70bd2d, 0xe52, {0x1c, 0x10, 0x14, 0x80, 0xfc, 0x6, 0x0, 0xb, 0xc00}, [@RTA_TTL_PROPAGATE={0x8, 0x1a, 0xff}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x100000000}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x9}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0xbb46}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1b, 0x3, 0x40) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r2) 03:39:12 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 3: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:12 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty, "00e0"}}}}}, 0x0) 03:39:15 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:15 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x10000000000001c5, 0x3) 03:39:15 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000001040)) r1 = socket(0x2, 0x6, 0x8) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="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", 0x1000, 0x40000, 0x0, 0x0) r2 = dup2(r0, r1) write$P9_RREADLINK(r2, &(0x7f0000001000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) readlink(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)=""/81, 0x51) 03:39:15 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:15 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:16 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:16 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2061.092653] kauditd_printk_skb: 105 callbacks suppressed [ 2061.092662] audit: type=1400 audit(2000000356.290:60205): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.175349] audit: type=1400 audit(2000000356.320:60206): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.237734] audit: type=1400 audit(2000000356.350:60207): avc: denied { map } for pid=10933 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.272930] audit: type=1400 audit(2000000356.390:60208): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.299279] audit: type=1400 audit(2000000356.420:60209): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.325963] audit: type=1400 audit(2000000356.430:60210): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.352476] audit: type=1400 audit(2000000356.430:60211): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.536316] audit: type=1400 audit(2000000356.730:60212): avc: denied { map } for pid=10942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.560323] audit: type=1400 audit(2000000356.730:60213): avc: denied { map } for pid=10942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.582695] audit: type=1400 audit(2000000356.730:60214): avc: denied { map } for pid=10942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001f80)='/selinux/mls\x00', 0x0, 0x0) r2 = getuid() sendmsg$nl_generic(r1, &(0x7f0000002200)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000021c0)={&(0x7f0000002240)=ANY=[@ANYBLOB="9c0100003000160826bd7000fedbdf25030000002dd6b9fa90002562c45924907743c7f6bcb52bdf9e9e4729e5a6f772bcca81536f33072f215ecbc47f5949acdb31f6e6c0948beef7052d457252a6761075a087523cabb2f062bdaaa7fa9284f93e453b7cb35bae3c4bda9c90c1203eccf3ded27e45d6e532549f022c4ddc8f0e4de54fded5f575e066cdf2cce16497de1c6514d6a3bea989b04a413eac5abd48c7f12cf52d674f917531cd03b97f4a38383da176d00e1397f99f60cdb3241f54c30fe914044622ee896ced2fe4c17d4a277ba1aeebf218272fb336d6073d72b811d0a3735622e8993e5d670206ada808002800", @ANYRES32=r2, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) recvmmsg(r0, &(0x7f0000001e40)=[{{&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/129, 0x81}], 0x2, &(0x7f0000000280)=""/4096, 0x1000}}, {{&(0x7f0000001280)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001300)=""/48, 0x30}, {&(0x7f0000001340)=""/55, 0x37}], 0x2, &(0x7f00000013c0)=""/19, 0x13}, 0x2}, {{&(0x7f0000001400)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001480)=""/22, 0x16}, {&(0x7f00000014c0)=""/99, 0x63}, {&(0x7f0000001540)=""/180, 0xb4}, {&(0x7f0000001600)=""/92, 0x5c}, {&(0x7f0000001680)=""/130, 0x82}, {&(0x7f0000001740)=""/121, 0x79}, {&(0x7f00000017c0)=""/159, 0x9f}, {&(0x7f0000001880)=""/19, 0x13}, {&(0x7f00000018c0)=""/113, 0x71}], 0x9, &(0x7f0000001a00)=""/197, 0xc5}, 0x1}, {{&(0x7f0000001b00)=@ax25={{0x3, @bcast}, [@bcast, @default, @bcast, @default, @rose, @bcast, @remote, @rose]}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001b80)=""/69, 0x45}, {&(0x7f0000001c00)=""/202, 0xca}, {&(0x7f0000001d00)=""/7, 0x7}], 0x3, &(0x7f0000001d80)=""/132, 0x84}, 0xff}], 0x4, 0x1, &(0x7f0000001f40)) r3 = socket(0x10, 0x3, 0x2) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = dup2(r0, r3) fcntl$getownex(r3, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r4, 0x26, &(0x7f0000000040)={0x0, 0x2, 0x3, 0xfff, r5}) 03:39:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:18 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:18 executing program 0: inotify_init1(0x80000) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000340)) preadv(r0, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/246, 0x5b}], 0x10000000000000d1, 0xfffffffffffffffd) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) r1 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="8be33bac8470cbc6a32f0eeae1e48084a5da14ca2363823d29c45392c06087489e91d1bc070af767e6730f12cc55ff5094d19403d03ce254e4947fc541bd01bf17275234835d0ce8b56464797978232dba6bdd7ed039618c1f3354e75c52bfd01838ab2b02afccc960b8f1d7bc47b144261dbdaa578cad15a1edcbd711aed7f9ba3ad2d13db2d02bb2e8ad77b60dcb8b31d58488c2b1aac669b6341aee048b5ceec24f67ed", 0xa5, 0xfffffffffffffff8) keyctl$setperm(0x5, r1, 0x0) 03:39:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:18 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:18 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) 03:39:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2066.304161] kauditd_printk_skb: 19 callbacks suppressed [ 2066.304169] audit: type=1400 audit(2000000361.500:60234): avc: denied { map } for pid=10978 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.332049] audit: type=1400 audit(2000000361.500:60235): avc: denied { map } for pid=10978 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.364781] audit: type=1400 audit(2000000361.500:60236): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.417471] audit: type=1400 audit(2000000361.500:60237): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.449700] audit: type=1400 audit(2000000361.500:60238): avc: denied { map } for pid=10978 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.472733] audit: type=1400 audit(2000000361.540:60239): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.472755] audit: type=1400 audit(2000000361.540:60240): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.472776] audit: type=1400 audit(2000000361.540:60241): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:21 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write(r1, &(0x7f0000000280)="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", 0x699) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r1, 0x3, 0x7fff, 0x8000) fallocate(r1, 0x0, 0x0, 0x10001) fsync(r2) 03:39:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bic\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e617400000100001ca97503ec30c7162a5e6f987e9bf718050000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e1fe916d3732f72abf35a86dbb45eabbfdb35e"], 0x1) creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x38) inotify_init1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r4, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0) 03:39:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x13, 0x3, 0x2) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) [ 2066.472797] audit: type=1400 audit(2000000361.540:60242): avc: denied { map } for pid=10978 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.472819] audit: type=1400 audit(2000000361.610:60243): avc: denied { map } for pid=10978 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x2c}}, 0x0}, 0x48) 03:39:22 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000001c0)={0x7}, 0xff9d) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7}, 0xff7f) syncfs(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x4, 0x0, 0x9}) 03:39:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) ppoll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0, 0x0, 0x0) 03:39:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x2, 0x20, 0x10001, 0x9, "90e40d8e4f6291cc7bd697db51ea4464f4d8797b67c3da74043fa8403eaf8c31"}) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r2) 03:39:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) 03:39:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:25 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:25 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=@dstopts={0x32, 0x25, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0xfff, [0x6, 0x9, 0x1000]}}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x8}, @generic={0x6, 0xf5, "fc604e4d53202996e704d404b4afdfe54021638c392ff64caecec202a4519f989bd523766e3cdade3dc057d213fb692a27acd655bb447ab468e137cfd6877082f6a17c29beb547aaa83f0863b995ec015e00be17b0bb815c49840a0a4cfbcb91433bbfdbf918d865c08d6a16bd64f9f97e80b565b6254e31d45ae2e9221aee1dfbd917b62e2266d02f08f4f69f766aa8dc61f2ba7e5f423a4d0602d4f1b2a7681ae8b8f973af65643ace1cceec2b36f9f1db999abaf0de57baff6830296985b54b4dba87bf0f02cd02e03af6be9ec9ceeb3b02a1b169420a40f2c206c9abe5b6e143ef87569e263e0e71c536606ed8bf31e47d8149"}, @pad1, @enc_lim={0x4, 0x1, 0x101}]}, 0x130) syz_emit_ethernet(0x2b, &(0x7f0000000080)={@empty, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'yam0\x00', 0x600}) 03:39:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000000140)=[@increfs_done={0x40106308, r4, 0x1}], 0x23, 0x0, &(0x7f0000000180)="f64bcc6742c053e54b677ccf34dba7310902dd397d03b46526e8e3aeae264bfa14f88a"}) dup2(r0, r2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x4, @loopback, 0x5}, {0xa, 0x4e22, 0xffff, @rand_addr="efbad828d9459d70f2397a33b995f956", 0x8000}, 0x65, [0x8, 0x0, 0xffffffff, 0x10001, 0xfff, 0x8, 0x100, 0x4]}, 0x5c) 03:39:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:25 executing program 0: inotify_init1(0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/246, 0x91e88ef3d5ca4a63}], 0x1, 0x0) getsockopt(r0, 0x6, 0x3, &(0x7f0000000040)=""/19, &(0x7f0000000080)=0x13) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) 03:39:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:25 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@canfd={0xd, {{0x4, 0x7ff, 0x8, 0x5}, 0x9, 0x2, 0x0, 0x0, "32481617432e5ca1ccaff8db89f83f357799c63d99a6771156e5cae6dbb3e6195e720c841d694c90fe609e14633ea67c1fd6f8370ad52c16e0309e05be454aa2"}}}}, 0x0) 03:39:25 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x1c, 0x4, 0x0, 0x0) 03:39:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:25 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'bond0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 03:39:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) 03:39:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:28 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:28 executing program 0: r0 = socket$inet(0x2, 0x4, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f00000002c0)=0x30) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000004080)) getsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f00000040c0)=""/55, &(0x7f0000004100)=0x37) inotify_init1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x5a) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='hostfs@\x8d\x8b\xbe\x1cL\x9d\xafn+\x8c\xf5\x99\xad\xb1\xe9\x18\xba\x1a\xd39o\xa7\xe5\xdaYY&\x9bF)\xee\x87\b\xa3Z}\xee\x12\xb5\x9e\xb9\\\x1aH\xf9>=g\x0e\xf1A\xd8\xc1\xac\"\x18~\xd3\x95+VYg\xaa\\\xa42\xe0\x9cp\xba\x8e\x80J\xf3\x87t\x98\x9f\xfe\xf1+X\xbb\x93\xf3pXt\xf0\xa6\xc7\x11o\xe2\xf9S\x89 }\xd2\x15\xcb^\xa4Yc\x9br\x94\xa9x\f\xf4/\x87\xb8\xf8j\x9bC\x19\xb8\xb5e/\x1d0xffffffffffffffff}, 0x84800) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000001c0)={0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2001, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000100)=0x24) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x3) 03:39:28 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) 03:39:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x972, 0xfff, 0x2, 0xffffffff, 0x6, [{0x6, 0x0, 0x8a, 0x0, 0x0, 0x1002}, {0xd5, 0x2, 0x7ff, 0x0, 0x0, 0x80}, {0x56650128, 0x8, 0x1, 0x0, 0x0, 0x82}, {0xd5, 0x48000, 0x8, 0x0, 0x0, 0x300}, {0xf1e4, 0xfffffffffffffffa, 0xf3d4, 0x0, 0x0, 0x303}, {0x7, 0x7, 0x1a5, 0x0, 0x0, 0x100}]}) r1 = socket(0x10, 0x3, 0x2) fstat(r1, &(0x7f0000000180)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r1) 03:39:28 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:28 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e679839baaaaaaaabb08004500001d000000000030583baabb7613f7000001110090780000000000"], 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '/dev/binder#\x00'}, &(0x7f0000000100)=""/4096, 0x1000) 03:39:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:28 executing program 2: syz_emit_ethernet(0x3c0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00794a08e7c74284ef5a7305023400000000aaaaaaaaabbb08004500001d000000000002907800000000e000000111"], 0x0) r0 = socket(0xb, 0xe, 0x80000003) connect(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @broadcast}, 0x2, 0x3, 0x3, 0x4}}, 0x80) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) [ 2073.943860] kauditd_printk_skb: 105 callbacks suppressed [ 2073.943869] audit: type=1400 audit(2000000369.140:60349): avc: denied { map } for pid=11106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.020136] audit: type=1400 audit(2000000369.180:60350): avc: denied { map } for pid=11106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.070474] audit: type=1400 audit(2000000369.200:60351): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.130170] audit: type=1400 audit(2000000369.200:60352): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.180282] audit: type=1400 audit(2000000369.200:60353): avc: denied { map } for pid=11106 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.205863] audit: type=1400 audit(2000000369.210:60354): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.230834] audit: type=1400 audit(2000000369.210:60355): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.255780] audit: type=1400 audit(2000000369.250:60356): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.280462] audit: type=1400 audit(2000000369.250:60357): avc: denied { map } for pid=11106 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2074.304952] audit: type=1400 audit(2000000369.310:60358): avc: denied { map } for pid=11108 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:30 executing program 0: inotify_init1(0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/unix\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 03:39:30 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYPTR64], 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x220002, 0x0) r1 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r1, 0x596, 0x6e}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha512-arm64\x00'}}, &(0x7f0000000300)="5a293a35763f2b10a2e504071ebd5ee23d3f611aead8e5812edd4a30b78125", &(0x7f0000000340)=""/69) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x11, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x3, 0x5, 0xdf, 0xd9}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x1) 03:39:30 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="3f80c20067aad09c0700000000000000aabb91000a008100fe7c8b274500001d000700000002909800faff00e00000012c0090780000002000c9294e6064218cfa02e48fac3561f3c2a7b0394188762b060ee96389caf207708bf1a22f239617509210637a29e89ca8a45e7bb8b81c8bce81"], 0x0) 03:39:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000080)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000040)=""/61, 0x3d, 0xffffffffffffd15f, 0x1, 0xfffffffffffffffa, 0xf3e3, 0xafe}, 0x120) dup2(r0, r1) 03:39:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sco\x00') write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xffffffffb50ceade}, 0xb) sendfile(r0, r0, &(0x7f0000000080), 0x5) syz_emit_ethernet(0x741, &(0x7f0000000180)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:30 executing program 4: chroot(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) write$P9_RREMOVE(r2, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2010000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x194, r3, 0xf02, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7865}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2927}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdfbc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004801) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000380)={{0x2, 0x4e24, @local}, {0x1, @random="13a094c90c81"}, 0x20, {0x2, 0x4e23, @empty}, 'vcan0\x00'}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000000)=0x4, 0x4) 03:39:31 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb087800000000e0000001110090780000000000000000000000000000000000"], 0x0) 03:39:31 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:31 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x9, 0x8}, 0xc) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KDDISABIO(r2, 0x4b37) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="4393d44d3b65469c8458c60e5af2cf39e9446d6ebcf92e0976bfe51ce96306289b133962e289267dfcd46b76c2ae8b44a6a8d0e0cd25177f540c66bf3ed0dcf8153691a89efee51b0c3e87eebbbb42c4f15ce4fe1ab8a04c11eaaf9756f499520e11e07dc3004185346c", 0x6a, 0xfffffffffffffffc) r4 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='/selinux/status\x00', 0xfffffffffffffffb) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="19a43c25c7ded3322770985312300c74893d41f4afa9a284ee1e7bae70b81b9638838732c73bb445c366fe98b475ba3425bc69c469cc1f7e931cf04978731a8dc25e04d565a36a21a4357b2c92aaf45f7777ae9fe3e2fef9e68bc048d907a6e1b05e42404bae9aaa1d94dbda119755c4eaa79daaf23e6f99414044b11fd072cfa73015b4865d6c904c71e084f40157df12ad00905683230abc05005712ac28084a2084f6b8a0448b434cda2e034e58e3861ca64394782bbd993318738d23a67cb593eb6043ce5aa8827b842ac3f1b48dc86a2f492565da1416d093a7b081879cad2e800adfa36ccb5c5ffc", 0xeb, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={r3, r4, r5}, &(0x7f0000000580)=""/52, 0x34, 0x0) close(r1) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000140)={0x6, 0x5, 0x8, 0x5, 0x2, 0x200000000000000}) socket$netlink(0x10, 0x3, 0x40000000000000f) io_setup(0x9, &(0x7f00000000c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040)="d77128b86334eb16a6764ed081e33bff", 0x10}]) r8 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r8, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="0100a800b012a64f812b14231f56daf44797950e70ea0df4ec7b28c11c2194c0c9e8ff0058a8c94f76a0d853ef647f7a9f0e5d7275bc306b80c8596e00902654df206a9870ed7cd5a46f6c90b029a492ba9229ca0e865045c9f8f4d4212b6acbe39958bedd10057ea9bacd9cd5eb69e8a85b401b1dff7046426fbae3664a7ff46f9ec561127a362e6bd6836b6e8a43dde2fc4ebc30a06a1f100744740543bb3ed6f68718e9fc8940c2610604"]) dup(r1) dup2(r8, r8) dup2(r0, r8) 03:39:31 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x100000001, {0x8, 0x2, 0x3, 0x7, 0x7, 0x2}}) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="451066f3b94b3439b809a7b9188d2d6bde4a67529e1d89fac4f036bf7a0e731b7a88d7e574765aa1df93c398d1884e5b3036aed43838709697ba48e61e564f636545f35c55aaa87963db5f769200516019053e3d23d9a2d8c2db1236387a8c79fc7b9d510bd2579eb0cfe596bffe5d86aec39868bb4af9b4621d2c424c9c3a6b493db9c520445d11aec7d00544a3e8a98f473b4c6e4f17b061f8697b56d3a5183959c64b6d7554a09115cadd9e06907d55f444300f113e2bc6c389835bf6c8bb8a93e11a896747e353f4f2f860cd35d921ff0823e7963287dd2bb7149d17d9f9ddb71e5b278f742815"], 0x0) 03:39:31 executing program 2: syz_emit_ethernet(0x2f, &(0x7f0000000000)={@random="e5c1a2e67983", @link_local, [{[], {0x8100, 0x3, 0x0, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9d, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="a71bb6322a3f56ee00da4de50984a9102952ee24068cd179f8362ba62cf018b6bafbebd30a2c782f76bb745df9388151e240d43175f8a9a638", 0x39, 0x7}], 0x8, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0x72e}}, {@nouser_xattr='nouser_xattr'}, {@i_version='i_version'}, {@nouid32='nouid32'}, {@prjquota='prjquota'}, {@nobh='nobh'}, {@nombcache='nombcache'}]}) syz_emit_ethernet(0x2b, &(0x7f00000002c0)=ANY=[@ANYBLOB="e5c1a2e679830002907800000000e000000111009078000000000f0000000000000000000000000000d8242000"], 0x0) setxattr$security_smack_transmute(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x2, 0x0) 03:39:32 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000140)=ANY=[@ANYBLOB="e5adc1557b2540b608004500002cdbc4538100011100907800001b9855cbf4b27af8fb6c12ac02feef7660c22a7e14b314d70000000062"], 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) mkdir(&(0x7f0000000100)='./file1\x00', 0x80) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 03:39:32 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x3, 0x100000000}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x40, [{{0x21, 0x2, 0x7}, 0x0, 0xffffffff, 0x7, './file0'}]}}, 0x2a) r3 = socket(0x10, 0x3, 0x2) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) dup2(r1, r3) 03:39:32 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x80, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:33 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000000)) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000040)=""/179) 03:39:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:33 executing program 4: r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:39:35 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="99b4a6fa7fe3", @dev={[], 0x15}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:35 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x200, 0x0, 0x1000}, 0x4) sendmmsg(r1, &(0x7f00000024c0)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e24, 0xbebbb61, @rand_addr="70b90adcb49b51b56e6f30607186f673", 0x1}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="bbe9e46925d3ac7ddf4a192f79e8a4a201f205c220ebc5da799b79f9f43f1a88ce44696e95e457d50dc145d20a542b", 0x2f}, {&(0x7f0000000100)="242f0491e45fe1a2fc0ab33461270474ab110b2655b51de9c81b093c9a1a9e81283a77cb2e1768b1f13af88e2a3fbbf61f9d5a758b59672c866d698750591d0c7c76bb5329e945af601996fc0eb13f9adaa151ede9d99a358095dc53e3cc8c2b45f53bbbe66b084dd4e972f379aa747e4305f3aeb5dc0cc325120f9da7f8cbd399c167ccd1ae598eb7aba47447201041c544009bd2c1f798d82b6ef9440907b2395328160235c1ba721fc449d437fa31eb3fdb58579f85ceee4c44fa", 0xbc}], 0x2, &(0x7f0000000200)=[{0x90, 0x88, 0x2d4240e2, "d5a96fc610721f8786ca292c163dc877740bdbe3f12f8aaaca651d24d65d7b5416a7f05ad58cdfc72e5953a558132d0db3a8ac75c11f0281449ba3676ac74e8f7feecdf749ec9933db0ac4bcb712da46db11a98c1158408c3034598ab5247b0594bb3f937cfc7ffd3862d123d5555c6b27dd008a8c1ed92344c5b17e"}, {0x1010, 0x3a, 0x81, "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"}, {0x100, 0x100, 0x7, "8030325d09bf4ddac3a9f3d930f42a0f88f98aa0e3719b14be54ad403c2000eadd5c8355c9c80811f64f8f7a9a59f8c70be96a3bcd941d983690e043dd1d7d4122c09758da577994728384f26123b8c58e0b94b07c0c7cfa59ca8d9d7748d63235173b008c01c4f4dad16498084c12dded40962c4ddbe1cf0cc8b456963da48c1b6083528ae9058580cfd774afd267b2493c092d1877fadeac50b8eb1437d341995d3303e1071a23bad85bf93ecec7d527def3b75782a38cc8e93eba7399477326f15aedd4d812a52af593e5795407ca3044dc79c56dec66c4476740754136f7039e4959c43cffc2a085eb47d4"}, {0xa8, 0x105, 0x100, "4e02d617161926dc707d66ca39ef37775b806c56998dd3558661f8c5cd81dbd58228e6fa37d199bb22739af438ce906990c1a2b873ebf6161331a066f4e045fd04e86ace23a3a70ed3afb0e47fe375fbc9686532bdf7043720c1fc5103e3f7c3faf597dcc4144ed77c822315cee56855ab29babd2fd53b49543f69276fdb122f029adb0253a6e3d94e6ec5b994bd55c5f9205b"}, {0x110, 0x115, 0xff, "b28e016d5e08ad679a108ab50928b6b0224aa3a5d3824695eea5cf903c87500a6062468143defe9d9dc9ee155a20337102274e2fab4efbc1fce01141b8363414019314351a028844fcc22b0d87e0351f5521d747629a1f58aee801b21c1bf950a59bab5442da9d820ea41658d30682ba156a3074733e72e8f0d7f0d9b9db53447d905679be23a780889fa573de490da44a21e6fac07f4a5fb95f8a40288027b3d3f46e401c8e4427e2ba4cea702742224dffa4ed3841a0577c63c949e2e7e67f11d45a76203e2736942a804a2bc68cea9c2be9c1eb4c0ed9785ff3be298c391695e849bba70c31be9e1e077138662aa2a99df4d4ca5e904d151c03e252cb4d"}, {0x80, 0x119, 0x701, "718add0d38f114b2b933ec144118161d06b063f2444e999279d8099a81967aa693851758b4a368af585f311f94caeaa5cfe467e9e7c79965f3bcc6af7e1487ca17c739050b89b0657be8643e9172143a26eb3430ee0a6a58aa89fbf8535c8ff01bd5d6f3554ae469732a69b8903966"}], 0x13d8}, 0x7}, {{&(0x7f0000001600)=@ethernet={0x6}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001680)="037fe4d0e729f7e55e44ee6783fa4e0d91daa39075e5bf621df1c31d93b97e9b8903c80612faa8233469d9448429e0070cdd4aba90252317ba065e1d11d5e22d0338195e41ff7d2bf304f493ae988cef4dcb069c0e13832521938408314d12542c8db9f5cad738a0bca69d2345f03f84fb517d632e8b146b1777716d64fdc50183c6c7c7179e6e09fad014aa40d36562735481a0082d88f076ce82c490c43b2bebeb19b99e6d0957c24e1352efc0ff", 0xaf}, {&(0x7f0000001740)="97465b4f7f6b02ff420a6e038fa4398d392de2072268b55236d7e6970c7d35a17a38b8998a1ec48495ccd8a2fcca434ea2e55238ae0f2c2dcf91e6f82b1f2da326e154b89166ad522906565a277b81db190cf2e8c3b8afc7e35b2cade706683ab3f9d17a3e2cff60cd336446255b", 0x6e}, {&(0x7f00000017c0)="c2e696bc07c5b7111ccc7cba30b7a4", 0xf}, {&(0x7f0000001800)="ada5fd660e075b52284039da125f04d0fb55988af979470ee8c5bce7de8b5ddcd256f7e917ab741c4e3d00ce97d9aae630f97ee6a0dee4c190d7537cadb46dc9bf4679bd4aebc405ff3c29f42393a0b12e2f01a45917c9e9c7c70ee36aac47d8ebf8e52939f84b3f6a53af8d3ae16c3d34174adbc3dd5b3cf0b7f95578252f4e87b6c4ffcf80d2f10dc870da7c9939f0f84453356190901f8a0772f704db6f36b945fb7928724840f7067e", 0xab}, {&(0x7f00000018c0)="b329cc4c4451b098d6e4efc0027aa741e634eccb28e836c85127609fbfa444fcda84bd67eac5de71bdd041fff75fe9c400d48b4db6747676626fb377ffcda13fbf8282e0b915649f5ea579804c46c9a2fecd50ee6790c0af64785b6dd6068e98526490171928cfc79894b84ffb1e7602207959ffce802428461dd297c83bcbaf7287d3b7b43bd87e2e6f6a5ccfdb71274e8fa692176faabe729e402b605644b3c76772e37be2968f6feee60749073f", 0xaf}, {&(0x7f0000001980)="d545ea080277289ecbf4ca47fcc9ee475517ece91ecda7e3cc59a17a94d6f07fc15938de60cb0ea94f44e4870f6eef078727736b9cf2c5c23191c4c258e0c8c404645ccaa6cef48ee48b8b39bfcbf20ea5c240cc8ed2b21ca55a7ad38ab3b8e0b2bcc212d375289a201baced9460df543d448e77fb88b7112702b52e3c8b572a032869ea07e9dfc160e638849916a708f6f40208ab4d5df97c31ada148d9f8590da0a43daa307801a243c49be9aef5367c5f1b955f52965da47b9b7a2c6fec0af5f6c46b51", 0xc5}], 0x6}, 0xfffffffffffffffc}, {{&(0x7f0000001b00)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b80)="e304525e5e750d6f498aeaf1e2972f1fe25b6743ae1f1b6dd0e3814985106388dca8d25aa5c09d4c00039493eaf621cc2838533fbd21793f40d9bc458d9e80a2c0913c7c37ae4d00e5be5661f8c5fe5a86e755f991f6f40608b5e26fb8bc55f36ff6e606a3de078bec79c5da111c7054", 0x70}], 0x1, &(0x7f0000001c40)=[{0x40, 0x84, 0x1, "b2185219702412c3af660b02435ef7cd7ac5da98dd32c7757c506e575dcb7a98086ac9d3dd3d5f094d604df26e2a7a"}, {0x110, 0x113, 0x0, "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"}, {0x110, 0x10b, 0x9, "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"}, {0x60, 0x10d, 0x0, "f3a4ac301f7e0f0783d70f498087962e83ba64f6d3b11aee53f57c176f4ff493a5167a222f2269ee121054da9c39d6e45ad2e71ea1502fa7435b95279adb246896371fa38f40e4827626"}, {0xa8, 0x11d, 0x81, "4161932bf85f2559c54cbc2222053fa74fe50c404783d720abd5322297a0f56ff896d066f563729dad33d5e6eca0f58d1a63682971d7497262b4dc00278e4b1af997c22e7927ff177cd1cb59cf4f24de17f00a796cb41e82f026930517b1f3a54ff4cb44aa3b080152c67cb9c5c401cc58bb0bc49ed0342053a8de0c3dcecf79cda185b5d05239aac48aab7b81a271a2c622ac"}], 0x368}, 0x3}, {{&(0x7f0000001fc0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x3, 0x4, {0xa, 0x4e24, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7ff}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)="90493fd0a0ff313b940cf7ea0d69d36b713341b282821deee8c170e84f12c61dffe180a336346d3b35374c00c6338115095c91925d9717998bb2f114e96ce2b33e4819bd118605f3d9e043efddce04fe6064812cc99d17912c9044e0ef814b3fe7d168f6dad0a24317c6c4ad6b098072e44e974663eb63e8f51c68f19c4f894719ed8ff35bd46c711658ff0ba0de7857a99be216c4369afcabb0e455e3c095894517752d15283c6dce84a1f98650", 0xae}], 0x1, &(0x7f0000002140)=[{0xb8, 0x11d, 0x1000, "bc87e1d422c5e35fea141ee987b35ad08f1e36e65ebce71226fe7933acbfc5c8e0d0ce251b602cf4e4686528986f5cdeec1c0afcb87f5375985fdc79ce01f0210bc30e24531eed27249370ce70f159fbe724ec548b89522e060fc0443b9b713cf08fec76a794ddfe638338db651d196e90d52482b98fedb6bb036ab9f2b1f69ae49c035c520daacce60b2d30c86c37198f4ca251596e97aec0dcd833b32b0e7e1e33a5a4bf"}, {0x80, 0x117, 0x0, "b59c37161c0db042ad19af1739788ff9da8ee4c20e4ee2b5adbe728f87c03c74ff9c1cf0483703d53ec275194c199378e72b2bfd6f485e172ac9ad367ed231d9963e9914b640e756d68778e686bf5a4ca233b1c7f81a62d9e4a4750cabbfeb13cf5dcb9f32a1daad46"}, {0x90, 0x10f, 0x2, "85733c7f8da4d29b7ed66bf093b59d857c414e691cbaec84c959050845ea98873d58ad6ca3ae35b1ea76cb5461c1b67faf50679cdd011578de1eb2a1046fb20c6f29a7354886569a862a6bb99a7f5442a358c3408284ef73734e7cad49121624e323c9339e71b143ad218c1f73d77f53d8ab1de8c81f95e221f9"}, {0x78, 0x13f, 0x8, "e7574299715261fd6bac17764a9bc11142012e9d22d76d4d690e76752f2fb973ca0bec91f1286f74ff63cc219072b0d8a17d4efb058ff6d08c26e1a443c0d67dcd455d16febd588eb4294d9875089407e6c90ca93982b1da7aed525f57f95c341e05bd37051ca7"}, {0xf8, 0x10b, 0x5, "3ccfe2f732ac7a8bbfb690dcf4f2fa8822296812ead06834d208d2bb48c893fea85d61393f7f0291a6a5c01ba164cf92a50149d1a0a088fe6af384825777ced6b56880ab3e320921f6ba13e87334c630d8a07da25ecc35f1870516ac71fab21e4f22ffa8ecb20036af5d8c80a7f2c6c4140c268be525d445d4f6ad9505629b49b0b2e3a5f04531a6050db574216b732874d8aa99246b8ffc8470d7070f7c3540fdf48a3d6388c686071fc044cad2eee559264227401b04105acb3215c6d8b5b977fd55a03d6c9be5b0dc1401310f15fcbbe2682983b7345fc377667b3de499c18f3ab71b5618ad"}, {0x10, 0x18c, 0x100000001}], 0x348}, 0x7}], 0x4, 0x4000) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000002700)=@get={0x1, &(0x7f0000002680)=""/104, 0x5}) socket(0xa, 0x8000b, 0x9) getsockopt(r1, 0x5, 0x5, &(0x7f00000025c0)=""/116, &(0x7f0000002640)=0x74) 03:39:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x89f2, &(0x7f0000000040)="eae850cda274a69b9e0acaeaabb715c4b7437c58ca8b9f88d9b3d1c67899c28ef6ccd5b310b94c6f42968b8116fd394c23f221847630fc6205ee418e1626f4058779bed095d1ad391977f1883ba55a5cf8235ab0ffac94ead58b6c994da14fbf099974f983368f2cc8e6f9f384489e5d0d53d47e69eaed7621b0c3f02030540fb97b4fa1") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb0800c502002abaa0f8e2a1f0a97800000000e00000011100907800000000000d11434cec853a1e62c1ed"], 0x0) 03:39:35 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) 03:39:35 executing program 3: syz_emit_ethernet(0x2f, &(0x7f0000000040)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaaaab44aa156d63990f88100210008004500001d00ffffffff01907800000000e000000151"], 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/4096) 03:39:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2080.017845] kauditd_printk_skb: 147 callbacks suppressed [ 2080.017854] audit: type=1400 audit(2000000375.210:60506): avc: denied { map } for pid=11196 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2080.118569] audit: type=1400 audit(2000000375.250:60507): avc: denied { map } for pid=11196 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2080.196974] audit: type=1400 audit(2000000375.270:60508): avc: denied { map } for pid=11195 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2080.242996] audit: type=1400 audit(2000000375.270:60509): avc: denied { map } for pid=11195 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2080.310494] audit: type=1400 audit(2000000375.280:60510): avc: denied { map } for pid=11196 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x7, 0x97, 0x7, 0xf, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_address={0x5, 0x7, 0x6c, 0x0, 0x0, @in6={0xa, 0x4e24, 0x78, @remote, 0x6}}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e21}, @sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@mcast2, 0x0, 0x4, 0x14}, @sadb_ident={0x2, 0xb, 0x7d51, 0x0, 0x7a1}]}, 0x78}}, 0x800) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') [ 2080.394904] audit: type=1400 audit(2000000375.280:60511): avc: denied { map } for pid=11196 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:35 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x410000, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x5, {{0x2, 0x4e21, @local}}, 0x0, 0x3, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}, {{0x2, 0x4e22, @rand_addr=0x101}}]}, 0x210) [ 2080.451050] audit: type=1400 audit(2000000375.290:60512): avc: denied { map } for pid=11195 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2080.550260] audit: type=1400 audit(2000000375.300:60513): avc: denied { map } for pid=11195 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2080.624425] audit: type=1400 audit(2000000375.320:60514): avc: denied { map } for pid=11196 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2080.700584] audit: type=1400 audit(2000000375.330:60515): avc: denied { map } for pid=11196 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:36 executing program 2: syz_emit_ethernet(0x2b, &(0x7f00000000c0)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaa2aabb08004500001d000000979a0f854ede8a84c2b680bc000002ac2c57c5000037e00000011100907800000000008aca1dc658abbeab4a036108dc54f49741"], 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getflags(r0, 0x0) 03:39:38 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:38 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x111800, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x0, 0x3, 0x1}}, 0x14) 03:39:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0xa, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:38 executing program 2: syz_emit_ethernet(0x28, &(0x7f00000001c0)={@empty, @empty, [], {@x25={0x805, {0x0, 0x0, 0x17, "f6fd2e2a1b536bbbc9257b25c17258780cc19920a35e94248824e364d56977ccfd4827aae1da083c2d19bae630c16ac5b975b114efd5a4d5aa5c9f5633c52d182d9130608b1e1f8d5035f81c173c2bf4e7aac83dc32d2bb0ca77a4467074b5de53e40da2a1a719004bafab0ae46618f13331aea6"}}}}, 0x0) 03:39:38 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/connector\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffc9) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000004c0)={'exec ', '\x00'}, 0x6) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc8, r3, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1d39}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x6c0568de5a82b981}, 0x0) accept4(r0, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000000)=0x80, 0x800) sendto(r2, &(0x7f0000000300)="dd23d1128d95cddda8d4956921d0ca2b7896f578e826434d0724e281659adc23805b743c6fa5655292b5888e141399270565878bf51605680fbceda2ace7f308224c2adf031cb53c8463667f40d44ae2187028ef3ef18c51a688aa9955b0139e48d5ba3e79102343842ebb3d02feb506bf93c3c2e7", 0x75, 0x40800, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @empty}, 0x4, 0x4}}, 0x80) dup2(r0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000240)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:39:38 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x300, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080)) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:38 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'yam0\x00', r1}) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:38 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:38 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e679834500001d000000000002276b7b907800000000e0000001110090780000000000000000000000000010285eab771ddb564c5e8d6d608be63225dea631d14964ab79424707d212dac26fb396939598c6eb06c8edd38542c653a8a17dc1b03efb75ad5753ba6d39fe70ddb5823daed7e6be21c6b1c402f8f04c8949ced325686a71c915479f747ab0"], 0x0) r0 = open(&(0x7f0000009300)='./file0\x00', 0x800, 0x0) sendto$inet(r0, &(0x7f0000009340)="45cbd72f6e82fb21bba5a6418ce2e29af681f4c0c7efc0c37a4fb26c3145188ca3c9de0b77f5d91bf12e897270321c324c6484a4daabfc49c346b3c286ab35322ace0ed1c31dc6b737d678b863efab5067e978a3c7a599d5928b6a1c579e8f790d35f0106a2ab1e5d33ce11b71321d52258cde08bb7da80c1a95c26dd5064fbfd6e452c8af5ba3f76414e8b009fb2f0f796b0bf34c463e79697a9926999a780815e7b3f0a58bc07e1a7deed17d001e348cc0cbd9eee2bcb6c486634e44e85c5e2c2f556890bfcb71b2052d8c399216f4bd630086fbefd91435403a1ab7a54ff2b40940f09f5676c605353ec2b38a9bb8bd805d9b9a2ee16f436e83b7ced6d368fd5bc0f1ad5e26138a4d0629c299283cb192a176637d004da8a986e324c787f2523bfe1a7a0596b394256318d55d52a069844fe6d6d7e3371ed321131fde5b978183ccc48802aaa4028408dff342c6c07346de7f6632206e805690be4d42f66399eb39010c25d6b724b747c5f585d7df60919ae311bd5950a587c53075f834aac688cf2e6f18b535ca30fd5ffb359af9456406105945105f3451827d5b26a38042312d49f9713ce83d7f6b77ffeeb13fd3fab2bfbe171bb8a767e9345f960e8ab64ea388253949efcae589ed1a7136a66d221a9122f76e8b3daa7bbc0f71b0b9e4053a51c7462e395bf01f0b6c459475334c36bfef84505155418eb5bd05b1861a20a1410f284886f88a763efa721cd3fcfc26c5476dfc3c6a72b2ede2160057770a7563be4752b469a3d4dbfd1e5f79f617e66de778cd08c42b28223cead562884f402ae33879b113bca2ac38dcd1d1f25a3ff7b9ede702762692aa3b87530c8b4a764c016153dc1427971ca02fddede48dac01f0cce85107d724780b0e117ba93f9d11d8ebd84b7e2ff93563912b810f4b2caad96b62787c7ef3840a3067c5c85335ca2e20fc4735ac09e56c06760b6abad5f4ef9346cf74a89bc3168e67be75c40b1cea70fceff588825a667de8331795575f06cd4664858d525ef469300d8bc0eac9edc6eed39f265a85b73e812a24eff9879706c097b3f417b9a6e44daa5ce73cdc4bb0036bcf44130cb6dc393e46e6fa9023cbde0d0c5bd9ba2656d149025165b68413dfae4197feeb7ff90bbdba78907052975b87f5a3bd8b804d101483360785c45e3ed33d02eedcadd8a392e2e6eada59c5a8bd20977470820c44cf2db24cec55e00072507c4f544464c3059e2dc1d9c901affb869b0abbe428222f28e3a8260687807c766bf0fad65dae7afff82574e9bc23f71fa0421913be29ac04dc0fb4ad831065fc845de6c6d0f0da0ca6d29bfc4e8e7d9ec66a572862690ff6a3bbe119c64b6b86bb6d9048ed6ec8500fa81dd943c0a277bab9f8539b27afbbe6c3c677bb03119583ed4d948e62757191d0440efd25222421a3b5ab5abfc35c5239f3f8d4effd161f6c16a7572421a40fa6fbf36768aad2b97872a2c467f08dea6e1fc96dbba9f29548f42b5dfc3e6b1ce387adf39e1d59bd530d5d30b2efc3f5c958b781d1b67715af2ad014c24460baf6f60a14af9414cbb7ace15f5fbdb38427f903a24ba04796d56ee39edf41cb5378935a511c6ae40269326b44bb3a10139180201bb6189e5a7607da43a218460e508f9ed48f44a89f8e2ce4abc037c93f2308ac626e36b3c14c7bf5e5901b0743d3c9a29486868c8f2f996e1add7c2582f2d4fd4f2aa3a436e30b8605504e9da3a4acae02175242aa34799e59681707ed218008b28f3ed171ef1c8a7e1c37fae8919d31da347f8f8807f77efc542ac8a75cfe640b455bcf2e0610bb2265297e314629863fa363a5b2e283a40f169ae5af2b906bf0575d335513deef8bf77e85e44974ed0fd1403745f43c5d5b6a87fe56e6d04e9cc63d43b3420a4cde5ad7dfbd7c615e771885ab8ece550f1ebe1f2b9d9642a70d7f7fd827d76d881b9da5a3ad144bc5e1af57fb2150fbc4b4e8e292300afca639005e02e2ede92b760276b2a084e4187ca3acbc5ce5f654ea57254e4e9414eedca7cc47977c3b05873ea31db4197dce54208ece2732ce883ab4bdce533029a9a206d602dbe373fd31207baae75cbcd6ac4bb13eaef2c733a835783145c9ab332e7f8ebe32a50ad74cd468102c610a3d2ca9aede148a03dab42b20140a9d3f2141403104ec6fcdc86ed660d19b42584df389e42239852f7325325ccd3a135fefd1aa291f13432b7112d866aa8ecd05d42b92ce17ed4d6779173ab36548aac130f02067c3249389cbc0d1dc19ce9af5cd74bfeb5ee769ee650ba2b62919b175354d742fa418a476ad3340632ed29889aa0fb85238509a7a32ef0c2a9012ccdeb9808ba2ed43157c58c0f353ff75b8b8f04556591b56f04a19dd66c66c7bf83c65e9331ac16b86b60a172eb7e045459e299e70bc98fe435d9a6445f12745ae1c1f19f46724a395156d687b7f1146e68a7bc60debd86c0d4fb8b96b308f3c687dd88dc5e90bb4b6cc0ad5c17c8782d46880c373272e4c5f8ab597839ea733350e6dab635d702b9080e86bcf3264e7d43fd3a7c7ccc03385dde8a5ebfce3c47040a778972d1b06440c34c374cfff71e6c2620724edd4538ce285da29df54cb0fd5b8636a643f0709d7e6954f359bf6e6db9b6470b0efca1c11851feb998375cdff0013d08e1965f72510ca3520e86f4238b5d8b119e2879b4985c3ce25135963037a016ceca74c2f8a052a6d910ed986b9ed8bc1c3e7e18073d8c348f1aae6460754b7829a0d5e613d2974b44683e9dd57b37e6edea88fc195d5c9365a547687ecaca91d49e4706ccb79370ae99e3b9173fecf70f089759e5aca554a0eb01b438dc47c2510cdc65539c6ba2f1ed0142080f97b398146f1aa0bb762fb0fca1b96c245278fbabfaa886512f43aa152c1b103638d3a3184a2f918ba9d289e8694117de2da7dc9a8a4a6830e082196e43f8146edf229d5dc0dcd78b56a3ca514c81d1af0e195e2207a5e632f59423a0cb5d54c0262124979ca0ae48b12b6633f3935071cdc95749c5e98e5805c80bd35c6ce1af38af7f2c79e946b4a4326025bfccf310a6002d12c25b30c5b5d2a78b3e05f372e0dd084d9f5b3a8a23fddd2dab89ab6aa0ef284e87a6a4b33a99f62c044db137b13a2e181764cc648cb2bde5f355e12a528ae13f74d066ec9152d652cec0032fb64fb55997eea9fbb85629afc6b194af48a715d349ef2f71bbda94a8468d333d31ad54166be116f162c809c9ac950856a2d96fbedcca7b523e619dc550fbac061b5e327b9020822c957e562e600ded01d58f55fd41ab86780351c3ae46c1e8c44f0c55635b6f35e3c7a38b1d24cbc59d3b2dc348a92dad84e76e6c327e9309ddd6409c32f7f0414fbb3f8e96d42c443f865bf8274094af3505b441a4b137809aee4a955a8223b818b6b586381a50675938ab712f80cabc92ebe13257442be31392e4dd725b90738e6853d7e43c2b6179b99710f8be3cc9a3ef17479c9c094361b1bbfe14f058cf06b1f4323d88e44dc264ca1bb47799c5d907dec144ea16d14eb5742909a92968c32973b40be90ef7b336850a2a2c808efc929177073822507d5b54e583fb411caba64af5330ca6f28ea56b5e39fc8fb3ae3cb73048577210304d80c3f8aae627d7f59406e52ddfb66697effc89726ce815ad441849e7774dda08d487ed5737582bdcb44cc5528fae2086901931c8befba196b9809c5f2ccb6d50d332226349e923a4a86b1dfbeac76c56d1fc86eb7e4160836544aab1e4627d0339744246e21059178facaae5c915be42cae52fa4fa64a89ac023ca202ecf368bc5f9420c68560336a6428ee915caf13cf116d51831c369228bf4a34190fb879ade2ebda96c758acf455b4b2ffc7b012b18f5c40e8ea0c4cebdc78e9a6a837661e3f695adce4e7a0b78047101dd37774ee286eb54d9ff2ea5c10ef211ec81e8803ec2a975671aa2fa6fcf2280d39cf16c73936d3aaff457359c66f980bdeeb3b8c38365aeb8e44050ea9d239e38ac62cb2ec038c911c2b92adbe6d5b530ff7cb64d4984682c58907bc6e3defb7c2686811eb7c1cc76a90406615c835295ccefddeab67512efa06e79a0733d2157837e36b0821efceeac1785426dbc09a7e0d2ba995d8ca76daae6ded983a4b89ef6380c5926b5edcd5a23aaeb3df37cde9d64baa82e309eeaee2c4c15dd4885f5cbfa645f1e927fa9fd3d6192e8c121f2f3a141c9340ed559718e98a122d8cf85d081e392f57f4248a17b4f10ea0c82b097695bc07387f7b697578a44e5e1ef01c3bc11e30387605a513a6b4ddf489cf4f0ca6c1c64d28bd86857727da54b2d73663b8fa13770d64f0af9ca420c5b3bc4355ead5a9893c5f9a6b65b67d9ffddde80537dd487fb0f6481fc1f123f773a7f8751d6e428695231d4ec3cdee7dfd4bce425f1c0776614f728fb31f2de2c014bf971db66a2a312e9124f4efba4692a4514624b3c14a304d68ded25a9e8daaf3197d10efaa93cf524b6a1bb8c379b8bc01e88c2a712dff98f73482af7236b2c0668ff0c94467ded45e926e7f7a090732b0f1404c3e9f6ff8a8c74e5dca23c7551532cdda68171ec58dd91d5cca0e4bbe95f4a833e401f7d26b9f4e3ed5bd4cd2202d3bb57d54c516291b90afbcbdfd5a86eda2430e018725c5f2227ae1f1600ae485f821b250fefb65d97e0adccb85e67e63dcb72f17d144f418ae36710e6ec190b0119ae5ed0ed5bd9ca4f159d2c57b6d56067a31e971266ce756412f6645a6144e237647a25c94dde9d642383315471e6c6446ddf8d4351508aad3bc0f9cc56a57464c469fccd2faa135af1155f0fae3d65f57ed3dd53174047ebb5e535170908dd35cea1b35be916eed7b2cd87034ba452ffcf23724eb7ddd17d9261eccc8b4cc4c60c3b8afc522fff1f1ec61ee7428cfa1dc45612e49649ff98447b0326301aecfebb490cd6aff906156909d38408cf89dd5fb58e50986052e44388ba8c9ccc19d3d0cae77d280d98de77920473b36a0f3ce21dc309bb864c9438ef48ae631d297252717ef35078ab47f4f6a50bdc98acae90ad94b9ecf3cf3ad97eeebb520927f6ff81c6d685ddda2c164fe07cbcaafe941f2d91298ed728eb39221fdcef102130db2b065db9be48ba4a04d5761e2d66c54afbea702a8839db336c2026554c42e2a9405b65aba8d2f85286ee7d22922515ac35404bd8297465675c412344fceab09e1299d709cd9bbfb5a5c303976c76b1cdc9a127edd535f1073a07f68aad7b37283885a423a41ab055724699b0b14e954d725072154d61e1ed4ad75ae0c46850b06778fc06d598eb4cad95484aa25619135e4dd3648d1ea00e33b9152bd9ce84869caaa3073a1bef1bdf148aab158ec0f6b0b476f060389ff1e2be1aecb266a383500b08f2e27e3444c95263bd8711fd6c5961098fd55e77fa316c066ef97643301299ed877ed98bdbbe2ad81a9c9c66370efefd908ac1b777eb0d027f905646695b7ef3cb37d214a708f7c84bb9446210e3ad52bcdbe5e6d9600573be6daf71fa4aeba0ddb268e7a7fbba881c8307c5d42654aaa7369c3a193963078823abc3647d229c25927889f283a40808b5549ddf2534f0957f21bea629f024488993eb2bf382ff067b395984488e89ed50e1e916a57bd704ae5156815f3e9d3f2516030f4a3f802c38a853074c4a759846c9e7349dca804c5ec14ec071c4ae5117e824bad6ba36ea4364d17d9546f4b98ec99da808eb6280e8b7be40f8ab9fc76feb9b0c71ad06a6ef8f476610c", 0x1000, 0x4000000, &(0x7f000000a340)={0x2, 0x4e23, @multicast1}, 0x10) 03:39:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:41 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={@loopback, 0x5, r2}) dup2(r0, r0) 03:39:41 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x24900, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) 03:39:41 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 03:39:41 executing program 0: inotify_init1(0x80043) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:41 executing program 3: syz_emit_ethernet(0x2d6, &(0x7f00000003c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @remote, [{[], {0x8100, 0x93a6, 0x6, 0x1}}], {@mpls_mc={0x8848, {[{0xfffffffffffffffc, 0x5, 0xda, 0x6}], @ipv4={{0x0, 0x4, 0x2, 0x8, 0x0, 0x66, 0x7fff, 0xa5f, 0x88, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x0, 0x100000000, 0x0, 0x3, [{[@empty], 0x1f}, {[@remote], 0x5}]}, @end, @rr={0x7, 0x0, 0x80000000, [@multicast1, @local, @remote, @local, @loopback, @dev={0xac, 0x14, 0x14, 0x2b}]}, @cipso={0x86, 0x0, 0x8, [{0x6, 0x0, "ed1222"}, {0x5, 0x0, "ba8ed8f009afddeceac0dfe0b0"}, {0x0, 0x0, "3d023f579d7a77bd80346ef5"}, {0x7, 0x0, "7bbea386cd"}, {0x0, 0x0, "43f82bc341095a"}, {0x5, 0x0, "97b42d11d59398"}, {0x2, 0x0, '\b'}]}, @noop, @rr={0x7, 0x0, 0xfffffffffffffffe, [@loopback, @empty, @multicast2, @rand_addr=0x7f, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x0, 0x200, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @loopback, @loopback, @broadcast]}]}}, @igmp={0x17, 0x400, 0x0, @local, "7fd184bedbafa67c3ebea8ec6178d881da0749febc93816e88a9ac16eec91f5c84fb0614e3cb7394050029b97bcd0d36867f2dbc44b5d3c955614d4a08b62bee12eb8c38222f567cc543172445a4e7073cbd3d4ed33ea04aaa1d9483f1d6457ed942a568ac8b4934bf5cc471f36b1b92410df49fd237974a16f119477f93ae81411b97221dac53e568dcf81b5e25dde0953e91ece67cebbab9cb08244af1eb3a47706312879d4d9c2242ca6a0bfdf31da48890121db09d0dc3439bf0306172632c8f438aa582ed0997e8a532be14d29eb780280d97d6a30f8236813807b54d406bff77cc694eedfddb7be556e3a0198dde"}}}}}}, 0x0) 03:39:41 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000040)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2086.467212] kauditd_printk_skb: 111 callbacks suppressed [ 2086.467222] audit: type=1400 audit(2000000381.660:60627): avc: denied { map } for pid=11289 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.545927] audit: type=1400 audit(2000000381.690:60628): avc: denied { map } for pid=11289 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.614816] audit: type=1400 audit(2000000381.710:60629): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.695250] audit: type=1400 audit(2000000381.720:60630): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:41 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200003, 0x0) ioctl$TIOCCONS(r0, 0x541d) 03:39:42 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.u'}, 0x15) 03:39:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2086.835296] audit: type=1400 audit(2000000381.770:60631): avc: denied { map } for pid=11289 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.917347] audit: type=1400 audit(2000000381.790:60632): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:42 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [{[], {0x8100, 0x3102, 0x34}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2086.996234] audit: type=1400 audit(2000000381.800:60633): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2087.099523] audit: type=1400 audit(2000000381.850:60634): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2087.225941] audit: type=1400 audit(2000000381.860:60635): avc: denied { map } for pid=11289 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2087.314602] audit: type=1400 audit(2000000382.180:60636): avc: denied { map } for pid=11301 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0xc, 0x2, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:44 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:44 executing program 2: setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23, 0x2) syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaabb08004500001d000000000002907800000000e0000001110090780000000000000000"], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001200)='net/mcfilter6\x00') openat$cgroup_ro(r0, &(0x7f0000001240)='cpuacct.usage_percpu\x00', 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) fstatfs(r1, &(0x7f0000000200)=""/4096) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$FICLONE(r2, 0x40049409, r2) 03:39:44 executing program 0: r0 = inotify_init1(0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x8001, 0x0) dup3(r0, r0, 0x80000) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000300)=0x7) r3 = syz_open_procfs(r2, &(0x7f0000000180)='fdinfo/3\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:44 executing program 3: syz_emit_ethernet(0x7, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESOCT, @ANYBLOB="615674bff07ebedcbfb0f9d39b545aad112904b0cf0ba9e827b0f4deda17d60b24b6eb0f1c4f148cbff3f494b04703fe2e16136f9dd591f9", @ANYBLOB="81854599d84177157945850534c63f4720dd5324b588223fb168d81cc5c52bc34c824994d46d6f84e06d5812f62dda", @ANYRESDEC, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16, @ANYPTR64, @ANYRES16, @ANYRES32, @ANYPTR64, @ANYPTR64, @ANYRES16=0x0, @ANYRES16], @ANYRES64, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="9cfd2929955de112c18e1fb27f73cd74d9f4cd304dea0373573988ddb1d717497296bc4cdac273691e969a19ec5bd400861528ad338f80256c5cad1fa2d6c86987d1ce8bf177a82f5609bd0b144084"]], 0x0) 03:39:44 executing program 3: syz_emit_ethernet(0x54, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @dev={[], 0xb}, [], {@llc_tr={0x11, {@llc={0x81, 0xfc, "c11d", "83c9dd22c2bb2c49a278a42012355cb7a6436e78f70a61ff32cfe52415939ea52474b8c9650256de4f7890b75be6caa2ab196fc78e0cc7e87bb600b202dd8e14406a"}}}}}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4001, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x6737) 03:39:44 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaa080008004500001d000000000002907800000000e00000011100900000f5000000"], 0x0) 03:39:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0xffffffffffffffa5, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) dup2(r0, r0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x20) 03:39:45 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08cb4efdbbaf907b341bb1d4004500001d000000000002907800000000e000f2006323b7fa6089f0e088e41100907800a4ff0000"], 0x0) r0 = socket(0x3, 0x0, 0x8) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @initdev}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000002c0)={@loopback, @local, 0x0}, &(0x7f0000000300)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f00000003c0)={@initdev, @initdev, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000680)={0x0, @broadcast, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000940)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000b00)=0xe8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSMRU1(r15, 0x40047452, &(0x7f0000000100)) accept(0xffffffffffffffff, &(0x7f0000000c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @initdev, @multicast1}, &(0x7f0000000d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@local, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xa6) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000013c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001380)={&(0x7f0000000e80)={0x4d0, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}]}}, {{0x8, 0x1, r4}, {0x164, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x98}}}]}}, {{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xa0c}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x1f0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xe27c}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r19}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x4d0}, 0x1, 0x0, 0x0, 0x800}, 0x0) 03:39:45 executing program 2: syz_emit_ethernet(0x33, &(0x7f0000000080)={@link_local, @remote, [{[{0x9100, 0x9, 0xd833, 0x3}], {0x8100, 0x0, 0xa18, 0xffffffffffffffff}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="be6ece0784aa7cb0b68e3f8d20f57c4a9012045abfcbde131fbc1be4ab3a258a70ac5ebca76aa9b4d5f3b38f2e6299adbdf826d93d6de639276fc3788b48d41114d6baa9389c560671461feb02188037f970a641397fe7fa28137ab0bb9a84140c82e7b4bee4d127e852f8ccddfd0c53db2be687533c0ce9bc9a36019cb4c8618a4e61c4f0a27c3c692f3f668b22af6d9cc002d8dd86ceb5a303103097d447d99fc0d1ec23569c22f7d137dc5b9562f473ea2699499541bdf8a38d05425bc295154094486a088fc1b21285c1586f8e7012a832130b6b8bf0f21aea0fdb92bc2e7ca6", 0xe2, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0xd9, 0x8}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x40, &(0x7f0000000100)={0x4, 0x3, 0x1ff, 0x6, 0x0, 0x2000000000, 0x800, 0x8}, &(0x7f0000000380)={0xa6fe0, 0x2, 0x8, 0x2, 0x7fff, 0x8, 0x8, 0xffffffffffffff44}, &(0x7f00000003c0)={0xffffffff80000000, 0x1a, 0x8, 0xc0e0, 0x7f, 0x7, 0x7fff, 0x8}, &(0x7f0000000440)={r1, r2/1000+10000}) add_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="9714af5134579c8a49a0f7922941ddc973204b1bd67f21a6c7f24c181670904733cdd1ffafc6bd8b8cca303f19ef75c1e6cf2deaa382a9e3934f2e1521d096e6fe5cb26c7f2f2a38e322f9c60182225664e05e25314281a77a", 0x59, 0xfffffffffffffffe) 03:39:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) mlockall(0x2) r1 = socket(0x10, 0x3, 0x2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) r2 = socket$inet(0x2, 0x6, 0x400) r3 = dup2(r1, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r3, 0x0, 0x14, &(0x7f0000000000)='&mime_typevboxnet1[\x00'}, 0x30) fadvise64(r2, 0x0, 0x1, 0x7) 03:39:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:47 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:47 executing program 2: syz_emit_ethernet(0x2f, &(0x7f0000000040)={@random="e5c1a2e67983", @dev={[], 0x21}, [{[], {0x8100, 0x7fff, 0x9fc1, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='wchan\x00') setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0xff00000000000000, 0x4) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0xfff0000000000000, 0x3d71) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80000, 0x60) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x9, 0x1) syz_emit_ethernet(0x1c4, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaa0f870c262758009100200081003c00884800000000ff000000000000000001000080000000000e00c0000c08000000008000000000800000004707018600680401010490787f000001e000000283070400000000891b01ffffffff00000000e00000027f000001e0000001000000000011c70d877f3eb6f80f21004b04cdece3009f0d4d47fdca1918b3b2136010070707000000004e244e23", @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000002c0)={0x0, 0x1, [0x4e3, 0x1c4, 0xb87, 0xa4d]}) syz_emit_ethernet(0x40d, &(0x7f0000000440)={@random="e5c1a2e67983", @local, [{[{0x9100, 0x8, 0x1, 0x3}], {0x8100, 0x4, 0x9, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, "b4cd6a", 0x3cf, 0x9d, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, {[@fragment={0x4, 0x0, 0xb0, 0x0, 0x0, 0x3, 0x64}, @hopopts={0x0, 0x28, [], [@pad1, @generic={0x1, 0x50, "40f316bdd0e313ba92dcb89db03bab841c616bc792bb5b56297b5e46f188e1f8cee02a09aecc88b4f7d14ef6b3e6fc1d135e2e684fda7ad4ef29f279173b4e139f5d161f603b71d8b3267cc1a53a36eb"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x1, [0x0]}}, @generic={0x98e, 0x1e, "0592f3f39c3eb47e2eda2930195237e0c685394fc0d03bd21a6abddb1dee"}, @pad1, @calipso={0x7, 0x30, {0x0, 0xa, 0x1f, 0xfffffffffffffffe, [0x0, 0xc152, 0x0, 0x3ff, 0x5]}}, @generic={0x62, 0x7d, "36d6017db8ec084c7f08a63db2afbdf79e82c3666c8be4504867807a759b4dae840e079c90b5ea4b0e2908cbf3da11a5892c75b72c86caeb8e97a1540ba5aa347e659c23b5f07165fe2d130745fff2a70151a7855b152d338b3d0e95b6ced79be19bc1319d7dab1a0be13afdc87183fe452d95cac5a299814d026d1fd8"}, @jumbo={0xc2, 0x4, 0xffffffffffffffc0}]}, @routing={0x7e, 0xc, 0x3, 0x746b, 0x0, [@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @local, @mcast1, @dev={0xfe, 0x80, [], 0x1e}, @rand_addr="bcf7662afbff253262b6afabd76a0a24", @local]}, @dstopts={0x5e, 0x2d, [], [@enc_lim={0x4, 0x1, 0x1000}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @ra={0x5, 0x2, 0x2}, @calipso={0x7, 0x20, {0x6, 0x6, 0x0, 0x9, [0x9c9, 0x2, 0x3]}}, @generic={0x0, 0xa1, "f1a1c4ed0d7280804a066afb09aa3c0709a7c1349105749f17bad6ae724fd35a1a2be65c8194c66c9b3f498a9e4640cbfe5bc2f8980a8d59a993c85cb25ce6e666058b13a9d23bf2a9ef1d4b1f08edd4b3c01122c131f72f2386873acc081845a11b94e1179f4f694d17de721ef010555932c0f7ce89c2cfc0c1030e3636f73c6a659b8a48db64bb80e228f9082c8fad1d91b8f3433afb08c33afec86a0edb342b"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x80, 0x62, "060d76599a2c21f90575abf298daba8e8da3f3833e5a2e8d813d30839a015c833cab980bb5f2c452ac53e2dcd4ff81af441878c75d5e671697937e970bb01ec33a2772990d1752e4b73eb771a78750271b0148e57251e4ba83e688f4ac8ae9b3a169"}, @calipso={0x7, 0x20, {0x400, 0x6, 0x3, 0x8000, [0x4, 0x5, 0xa494]}}]}, @hopopts={0x5e, 0x0, [], [@enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x2}]}], @tcp={{0x4e23, 0x4e23, r1, r1, 0x7, 0x0, 0xe, 0x0, 0x1f, 0x0, 0x100000000, {[@eol, @exp_smc={0xfe, 0x6}, @generic={0x17, 0xa, "7ea8553ab55c41e7"}, @exp_fastopen={0xfe, 0xb, 0xf989, "fbe25e35affb0f"}, @exp_smc={0xfe, 0x6}]}}, {"59a56242dca271e8ca38aefdcbd5217f103b014e2b82551ee35f799e4f293c4e770c5e20ddb2d00ddeb611e195082a74731960cf7ff957e059b6c3ca184474e6dc27ad65774e649a72fcab42c5dbc4"}}}}}}}, 0x0) 03:39:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000100)=0xfffffffffffffeba) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000140)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xd98, @link='syz0\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) signalfd(r2, &(0x7f0000000080)={0xffff}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x400000, @mcast1, 0xfff}, 0x1c) r4 = dup2(r0, r1) dup3(r1, r2, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000040)) 03:39:47 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xc0000022) inotify_rm_watch(r0, r1) inotify_init1(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$pokeuser(0x6, r2, 0x2, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:48 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000080)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) syz_emit_ethernet(0x26, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [{[{0x9100, 0x5, 0x0, 0x3}], {0x8100, 0x7, 0xfffffffffffffff8, 0x1}}], {@can={0xc, {{0x2, 0xe2, 0x4, 0x400}, 0x5, 0x3, 0x0, 0x0, "f7eb6a86042ea704"}}}}, &(0x7f0000000040)={0x0, 0x1, [0x991, 0xa48, 0xfee, 0x9aa]}) [ 2092.935736] kauditd_printk_skb: 147 callbacks suppressed [ 2092.935746] audit: type=1400 audit(2000000388.130:60784): avc: denied { create } for pid=11372 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:48 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2093.010097] audit: type=1400 audit(2000000388.170:60785): avc: denied { write } for pid=11372 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2093.093055] audit: type=1400 audit(2000000388.230:60786): avc: denied { map } for pid=11385 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.142034] audit: type=1400 audit(2000000388.240:60787): avc: denied { map } for pid=11385 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.189753] audit: type=1400 audit(2000000388.240:60788): avc: denied { map } for pid=11385 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.253230] audit: type=1400 audit(2000000388.240:60789): avc: denied { map } for pid=11385 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) fgetxattr(r1, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00', &(0x7f0000000040)=""/46, 0x2e) [ 2093.350314] audit: type=1400 audit(2000000388.280:60790): avc: denied { map } for pid=11385 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.398058] audit: type=1400 audit(2000000388.300:60791): avc: denied { map } for pid=11385 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:48 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x408000, 0x100) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc000) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:48 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x208000) ioctl$TIOCSCTTY(r0, 0x540e, 0xfc) [ 2093.494337] audit: type=1400 audit(2000000388.300:60792): avc: denied { map } for pid=11385 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2093.575030] audit: type=1400 audit(2000000388.310:60793): avc: denied { map } for pid=11385 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:48 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x9, 0x7, 0x2) sendto(r0, 0x0, 0x0, 0x40015, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) exit(0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setrlimit(0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r4, &(0x7f0000000500)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0xff2, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bfeb5f", 0x0, "fd8c1b"}, "4921bdcef9332fa2de8d5077fde483849be1b74f331d18020af1fa6b522252b8ab1cd428a4a7c9ff9a5a6aa389797812bff6794d5a1fb9c7eec2f396b6be65b41b790ab7b28c33c04c1fbef307472a7dbfda83338b09d6c1076cd44c7b208330a50fc5e00bfa399130db6fa1e3f8fb5d71be7cbfaa86dadd29fe26c405a5b49026e9d5dcd99f5e9f94e760ca8789d87e2d0a53f7bafefb1fd9977ce06f225b8e86a147faef7f5a80994ec8ef15cab4b66cf6bf1de1ba02c3581a989ce47b876207ddf66d16307b1d19f87cf552aec4f8150a047c3578121a1979cae5e6b0ea937f7bb7161387b3c9491ec1fa7e52fec51313369507d1d50bf17961d3f76c8258a0c7a07621c3ce10054e5e40c0a2ca44bea0f911c70c6558c3232d3045a8f3bffa5707ca3493f4f48ac2a4827bdba703b9feb8925db06b07c816b25f239f9a494d475c14a5c632b7b7937ebf17acc9893917dcc422caa0ea4a94ae46403ecc3f291dca9f8a02c73e5f0ab319759f0caf2b2defc2ee1f5595ae00bd668b97cd46766008f4d658254d67cc1fce962bb27837c4679b858cfeeef9e9b023082d29cf49b07f629dbb29f3fc5a5cc8ccca5b9979037d6112d2d3da537f2c36e87d4b0fede935c5521040fb29b773c6cacc23e040c5eb40bd070e6a759d971439040a0e4decfca16d454083b5b1cfa269b9aeb70459a1a8508911de42d0ff3495cd012c16c7b8598bd6fa1ef2854ac2fb310b37425e2e369dcc17d10f0b4156e87304edd04f02a284b91abaae25810683182be5e6bc971ccc4657d39d9633049731ad50a12463a5b1922411bca754b37c415f85a88e5d584a892f6fc7ce900bdaf3a813abf7e5d6f8526d7e779b0bac2bc3c26820e06cfdbda304d1305975053bc757b8ccff56946ab71fefef19a446e003aa8c3df0ad63148f1f14105a62d68cfbdfcef2417b1a27b84d4a0eb7ddb86a32abe9aacde30b6c737d3060d0a6d7e94ffa00a83ee4895c4c6404b5c221102ee4dbbcce6aa9df4c2cee69f94f7c786b7e5c49ca15a2c4e01ba6a351d6671e9d11833718a1e3b6a069641a1b32923ec5c54735594b549128aa09ab2c0ac015fe4a846d23d5e599148e9a52398a222f3d8394121539cc446619e931c98b009305ac6c1af7d4cb371b97d33334780b68b66dabaa609dd2aba37f0fa0f25f90b15696f7c064d7ba6a76869e168a1d7a4b1ffe99004d48057e1b189935be250e50ada53767b3a508ace35daa31a1a5cb50551e83bdbf27aba191b1978f94d5dcf1e0e3ca11b68591b345d6bfe805a278c7e67a4df7d4990453294746d7a78e1a7a82568519e5ce069ee5c7a298dfbcfe1df63772d406746d6e0d34b2dc3a13e91c77f5ff252e9801d2a9b1e112057229ada7fb2a511cd65f7f37717a5535191d13a31ef6930e31b12750de0a9f8c01f96f4cc7e1cde898048172c95d607577fb5e09205ec138d7ac6664fc845c2a5840a892495a7257589b37aa5489c30aad51ecfb6163d4d8007a894c75835fce60a03a980fbbba06f376397d5c1a89e4031b74216425af0402462234b55d5271f194267f57c20d881d31454170a5909cd5e0767d2a35dc5f7b7fa24a33e9a940ff7cf7c4b29308b6b5478d65fd18595723ab4e6980046a79574377e7e8853525c7da74228d346b351a2a43466ae77b8f5a55f4094600f58631f14fdc58b60da5379af56d2b693010cba5fef052461a33eb6829e1b99f92b573722b111206e336b01924e3ceadcc25842d6b89c8a1d12ca9b909b151886741ca3a730f57868ab098f0aa0e83ece9d5894cd8e09e29185769ba64a2f7b08b9acca370f5effabe311c4fe4ad032106001c6008b3c800391f4c696f8d6e0629dc0038e76398bd83128625bd6b57aa2dea7ac45aa4f218d435357f3e4b1c46d35beaaa16a2e27736bb7642e039699a7efb58946ecd3e608a5c3106927103c5e6e36db645d4dbc2df1bbe041ef9123d4a152bc0e5bb3464b335419381a431cc8add81ed622539304cd1628b61bc152b65074c02e7f7f7897795b679300a1a4e9843f085a0cae58171990aa675f3a2464d3e8baf0d67768d7433b488479ba5931dd51977885c9b83e7c0ff3cbe4864775eba601403dca9a19ab812a1fa08aee06451b738724148b0a773a471a084fe495c01461d63ba552e2d19ca137201949cd2b7dc2831a0833608d55586b09b14ccb6ff073ab0a4a7cc35d21a38c6daad294f9e01ee0aba94db05ac48f9106bb7bf22003c7f7059deeef39d3099c9db62ebb85f9ba21538ae92a5d62fa4cc062ce92f6b5f6c1ce00043ecadb7d44b01982bd356a7bff86a529b8be29dda99dbcc751c3f7ea4619a5e9fcd8c6cab007f5de6154b90b50c5b3f933214d67b2c915febd37e53bb6abf3fc31450edd7adc6e2c52f674e6f379c5449fa6929ddf988cd28d6b57536c61170751d467a80249f297fa6c9bd2df9405120cd74afab4df92eae49d21da6dd8574f4da0b6c4ea63e4ccef0b5fdd7fcec62dec6629287c4883c1a157e7bfb7edd29c44001c9997ae784f3cf8df295fabc7163d465b3c0809e6ac5ac9d5dda1983e69e69f43e7e676a3aa6812972324cc2ab8a02e5eb3f1c9588794fd3cc6d78d35c6507ae6652aa62f31f01ed3aaf8fc7df689e8c8ddba84dc74bc142ac7482b362c7e90e919346c3b6b784fb0ed0610bdabe7408fd9b824f229e2bf0b7b072c06b8cbad84c0d6707e1f5521d786608fa58e1b153b22916582a8bd19010ea5aff7313c9679415c648d73346be28695d4c36757f8b92cd11176161c087fbbd3d75fcdea62c6fbb4efc4eb30b446cbb0aa2d45091db4b987936dc7495d18aa3e92ea505550f07314f7ec6b98bcbc080cb17b6c0c63c97ce0bbc69b1d63db8e5cef375da737ddbc391ded7d45d06031cc6635e9a5d4aa73e8d1d2ed2325a3c00fd7049e59688eefb5b2631889ac515e637b407ce5e6830fcc7cce19960e13e750ff56345431587e647ca75ecca060b3eafc08403d9ac1f07d6a8ab4f20480b9d6ae4f60d82699f00dc3ce99a039d6bde1506ea6a9c3f95412e5b906db78c35bf7509d710908e41c4762f79713d2ddec16b079b703903d15c781ec704f58e9de8c0e6e84b7ee2ec7c057843e3eb6d322623089118eaf80c601bf332079fa62a44495e8f2323365fdecfa94234b76847f4288f1188c1430609971a726af38ae8cd556842a1dcfd864b18d61df2bf258797ff28c1d8192b8a34c2af699937de862a3f0bdacb10b3144495ed81991925adef81233c70439d5ad44b5e06ae8ad23cca2e36d97be1d7cacbdeb69cd49bf08836414f90175a46333bf58ad57b5ab86cf26caba8e1d9cbb6d63b139bd24e5eb93a6272d42aa7d59c4b6f83e48b6b46028a1bd885c404a2469aee5a9c7bdd13de0559db47ca723529209e4701963761778461fca4535fdbbefdac6801119729bf82812094daf67cce5d5afea9c844099a5795c76ca21ea0557cbf6b3ec8f12f3e2cb0a04e87d80cbd95c9ccc4042697e1b5d985d07b277b8b5323d1abb602ad768b50241d042c21d2e22df1476d246e19bab4931bcc600d506e10790fc5876bf1f0c8ad4af3f58f279da44261ee82cf10e196723c8a40ad40517c9ae2b0576048e47776815956a381255bf64f422015e2ea657e02e39cb359a9d1991112f2f68d466d02876a572d704401ba2a32a526947164e654e626627783b9bb4360461b383809226b6e1e7099c293a4c5720f0743882dd74c48a883992d2a465842916e63c8ee7a73e20face1d3b71c2ccfd61a13db76a3c1de5260318547cfcf9c5c4c47ae3868ca03bc8fd785ca8d0162f3d59fcf77e566d7ef7d631527cfeb74cf5048491819ca454e3ea72b256abb5e11fdcca810a6aed1f0780c9ad1b267c7a19175f7bbc4f06cbabdbdb9aeb43e6242376dec952835ad926de64811a662859a033084c1500354cf326ac98cd87d05542554b2d7b0f9c9d6e10b2d16e7264c5bb5f533ea288b26834c0d5b45aea1825682a591430799a58fb58150ce9e2a07ab68090a797606c426a3bcf0c34404059cdac4e3afafa36368de79891a1eadea582dbd939925be6d12b196393322557b3ecd467843e4ed7c2132b52eaf143dde97bdf6c5ac6a488fe50258e48b31f4e315cd3991ffc7f555bada77c08a54f0c8c05e50542b06ba1b24869c260f1c4a2a54c83fb35ae14aa4ce73661299656050c0ad0f01414b100dad8cc9d2990c5b56bad1da64229ddecee895d89686c2e69871ef022684587020061a98aae1d3499e281915d7f35f174f4878bb6922b0c5d58c02b9ee0c29022b2a61ca4046bb6fa78f355ac54c2df322f425ae2934cba16f34935104522537d2d59477d4fadaec4ce43d6bcfb8baa3b3a20ea0312df065a32fcd0ef6b6600bc5c76198af41160c4e76c422be9d954267d27711cd69d30a8c708ecb8c91faa398f2907b1dcc7b0d30b9680e5406d5b0fe1a520312d316d3addb86b2bdeec53d441fa3571124ff575ef479a75b43af4de4423eab297e9d43e6d9a314a69486324d832b1e797bb58696ef54d0b43b7fece17d9b0a55e1527d91458d0149d6c65068156735f9b75ed7705704363dd98d93b89146b9f318f24fedc51e9ac8de967fed7bca6890b3b391bcb285cb78c94537c381389fe07ab170a5ea70c84e40be62d4de1ffe85f72312b9ab2cd131d47201f2a88e77f210312f3ef7d77f72df167342619c50d494f029b26c003c62aa00f7284ae22e498761a28edd59342693a8275d715fc84ee56c53a8db9db9a31eeb0e9e32ada9a956a49ba651a649e30ea0ea12993d409ea5e7d85eb1c540a23d8ac47a7afebd9105f2c869e5af9bf87c92fc334b28ae48c17498292f8118f5c5876acdfaa1f325af4f0703c7fd8321d24a737487ff2e6f6e83a3e0c19e86c45638ea9b2bfcb43898289fdec3ace76adaf9edff9313d43e7837cebb5f8b05442dc442729acb96e50ef53d6e2d4ec9e2a8211d79bbe92b45250dd565bbfeb09990d4eb3ac7f38af3e4a47c511a03d9f67f84605b4a1d5eaefcc5dbc46e292322308a623147453297eb5774d366bb2d127de580ae7e716010ff6c88e910d13ba10fbee55cd73932d6967b889ba16f27c0ba1b21fe42e38c101cd1ffcba8f3312886abf76fd62cc9eafeaa42dfaa958cc6cd211638fffdedf065c54b2bdcab6c961101c3df374867756946560df103c993c8755d9a0ef2d2b76cf23eaca6517e54b21f459e42eb59dc382617c8f73d77cf55d14d312f9250353cbc9d7dc8e9bc21b714b246ec98cc98437810136e8d2b17bff9d1dc2ba61a80b4a6585946d200ee3f8bf808519626a8544be4aa421149f40a6b086215f2dcbbe4665431e8d5a90d91f6065fb76713a9e368f4af08cfa54420c3216e66e56c05a86a3a6ba6ebb814766c66def655734001795621526f72fae880f378997d3fe9f5c2c7ccd89cf9079f109d11f4386579034f594d08aa9a1a388fab602640c9e58a28373b206ce8f005f1dfa336e1c307c18c76ea3b704272e6e97fd68fd4b2c10e1164ed0b7bc66038ce14bfc777f0fe22940443025b1e4cad8444247b881cfc6593f8c30e2e657493bf9da77c3d3b5a180e801c06db7812fcda7db6fe0a393f488bcff365b0e196ba637080dfd93ca6d9d762ef2412cccac2a1274b832d36717f1cd7c1d8af3068a283734bdbe9381f737c0f"}}}, 0x1000) write$selinux_access(r4, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd'}, 0xac6adea2) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x88) dup2(r2, r1) 03:39:51 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:51 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000), 0xb7, 0x0) 03:39:51 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0000001110090780000000000820b0d8d78062d0165ef2bc4029ab70a49084f23d45cb024b2a637401bf24b57e5324b099377a2883ea9541b4bce75cfe734684b59ec59c571673ab4ef8ef31a4f82298ae90010e2094aa924026ec5d9c0528e86d4dafecdd49656196057889cbe91da81ab304415f079fee6df2d7eddc97ebedbf6403c54b82183ab0b01492842a8fcfb730aeaf074c53ecb2f44ef23df42"], 0x0) 03:39:51 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz0\x00', {0x7, 0x1, 0x4, 0x2}, 0x29, [0x100000001, 0x8000000000, 0xfff, 0xc8f, 0x3e0, 0x20, 0x1, 0x488, 0x1, 0x3, 0x400, 0x15b8, 0x7, 0x20, 0x3, 0x0, 0x0, 0x200, 0x10001, 0xc00000000, 0x7d99, 0x80000000, 0x80000001, 0x400, 0x9b, 0x5, 0x7, 0x100, 0x1, 0xfffffffffffffff7, 0x6, 0xf3, 0x2f, 0x2, 0x2, 0x2, 0x8, 0x1, 0x9, 0x43, 0x3, 0x2, 0x1, 0xfff, 0x1, 0xffffffff00000000, 0x7f, 0x1e4d, 0x40, 0x8, 0x1, 0x7fff, 0x800, 0x53c, 0x2, 0x100000001, 0xff, 0x0, 0x8, 0x0, 0x101, 0x9, 0x5, 0x2], [0x81, 0x2, 0x7, 0x8, 0x6, 0x6, 0x8, 0x800, 0x8, 0x8, 0x3f, 0x9, 0x3, 0x8, 0x0, 0x74d, 0x100000000, 0xe3, 0x44ee, 0xfffffffffffffff7, 0x80000000, 0x7ff, 0xffffffff00000000, 0x7f, 0x4, 0x8dc8, 0x0, 0x1, 0x4, 0x80000001, 0x4, 0x2, 0xfffffffffffffff9, 0x80000000, 0x1, 0x2, 0x800, 0xfffffffffffffffe, 0x3, 0xad, 0x859, 0x3, 0x43eb, 0xba, 0x0, 0x80000001, 0x7, 0x4c, 0x0, 0x80000001, 0x8, 0x530198f1, 0x2, 0xff, 0x7, 0xe6b1, 0x9, 0x584dab02, 0x345, 0x39, 0x8, 0x20, 0x6, 0x2], [0xc9d, 0x0, 0x2, 0x8, 0xfffffffffffffffd, 0x8, 0x2ecb, 0xfffffffffffffffe, 0x80, 0x8, 0x8c, 0x8, 0x80, 0x2, 0x4, 0x8, 0x1ff, 0x5, 0x1, 0x7, 0x5, 0x401, 0xda, 0x5, 0x4, 0xfffffffffffffff7, 0x1cdd, 0x80000001, 0x80, 0xcd6, 0x9, 0xfffffffffffffffe, 0x5, 0x4, 0x3, 0x3, 0x1f, 0x10001, 0x8000, 0x200000000000, 0x1, 0x6, 0x1, 0x0, 0x3, 0xfffffffffffffc01, 0x7ff, 0x2617b7e7, 0x20, 0x7fff, 0x7fff, 0x4, 0x30c, 0x9, 0xa8e, 0x0, 0x8, 0x1, 0x53, 0x435, 0x100, 0x80000001, 0x2, 0x3], [0x80, 0x9, 0x1, 0xc7, 0x5, 0x9, 0x7819, 0x3f, 0x8, 0x100000000, 0x9, 0xe3e, 0x3, 0x1, 0x5ae4f758, 0x200, 0x1, 0x3, 0x8b, 0x425, 0x3, 0x81, 0x8cbe, 0x73c9, 0x7, 0x8, 0x7, 0x9, 0x8, 0xb182, 0xd8c, 0x7, 0x1, 0x2, 0x3, 0x7, 0x5, 0x22, 0x9, 0x4e9, 0x3ff, 0x59, 0x753619c2, 0x12000, 0x7ff, 0x2, 0x9, 0x101, 0x1, 0xffff, 0x101, 0x6, 0x5, 0x1647, 0x2, 0xfffffffffffffffc, 0x3af, 0x9, 0x1000, 0x4, 0x4, 0x5, 0xffffffff00000001, 0x767]}, 0x45c) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x14000044, 0x0, 0x18b) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r3 = dup3(r1, r1, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000140)={0x8}) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x800) dup2(r0, r1) 03:39:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:51 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@random="667ece65eef6", @empty, [{[{0x9100, 0x9, 0x5}], {0x8100, 0x5, 0xc7, 0x4}}], {@can={0xc, {{0x2, 0x3, 0xe0, 0x7fffffff}, 0x5, 0x2, 0x0, 0x0, "8acdb1cef48eebb1"}}}}, &(0x7f0000000040)={0x1, 0x4, [0xc87, 0x67, 0x492, 0x690]}) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:51 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppoe, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20008080}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x150, r1, 0x0, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7b2}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_LINK={0x104, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ba140000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xee19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40100000}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) syz_emit_ethernet(0x81, &(0x7f0000000100)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0xc34, 0x58c, 0x2}}], {@ipv4={0x800, {{0x12, 0x4, 0x7, 0x9, 0x6f, 0x68, 0x70, 0x7, 0x32, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @cipso={0x86, 0x1c, 0x3, [{0x7, 0x6, "46dd65ee"}, {0x7, 0xc, "038db7cd630a2cc93b47"}, {0x0, 0x4, "41e6"}]}, @rr={0x7, 0x17, 0x0, [@rand_addr=0x6, @broadcast, @dev={0xac, 0x14, 0x14, 0x28}, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}, @tipc=@payload_direct={{{{0x27, 0x0, 0x100000000, 0x6, 0x53f84ec5, 0x8, 0x2, 0x2, 0x432, 0x0, 0x2, 0x1406859c, 0x6, 0x3, 0xffff, 0x7fffffff, 0x1, 0x4e20, 0x4e20}, 0x3, 0x3}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}, 0x0) 03:39:51 executing program 3: syz_emit_ethernet(0x11b, &(0x7f00000009c0)={@local, @broadcast, [], {@ipv4={0x800, {{0xa, 0x4, 0x7ff, 0xc384, 0x10d, 0x64, 0x0, 0x81, 0xad, 0x0, @dev={0xac, 0x14, 0x14, 0x21}, @multicast1, {[@generic={0x7, 0xa, "e074882d9d9a0a59"}, @noop, @generic={0x94, 0x7, "ca721c05f2"}]}}, @udp={0x4e20, 0x4e22, 0xe5, 0x0, [@guehdr={0x1, 0x6, 0x9, 0x7}, @guehdr={0x2, 0x9, 0xfffffffffffffffa, 0x2, 0x100, [0x0]}, @guehdr={0x1, 0x5, 0xbb, 0x8b, 0x100}, @guehdr={0x1, 0x81, 0x7fff, 0x8001, 0x100}, @guehdr={0x1, 0x4, 0x1, 0x80, 0x100}], "912395da265c4967cf35ce809a2364ab5bb2c3b17b881e650c8bed360df1baefb8a571511645050712006c2eda90fe296f80e9e93cceaaa28a30a933a29df59a5266fe15f65c4af6fdac8905ca3f2328c90cee2990f4bdca666ae581ba356e8a5a76343cc4e19632c065d0b32fe856b958d29a78bdfb51fda6944ba84f18ad9fe736e695351949766c8b41481ccffc329f7ee8355c6ebf35c3aff3ca94462a2af57c7da286978c284fefe687dc4c467eac29a4ff28df103d943d57d7259e83379142808f7b"}}}}}, 0x0) 03:39:51 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) 03:39:51 executing program 3: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='self{\x00', 0xfffffffffffffffd) keyctl$revoke(0x3, r0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:52 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/56) [ 2098.137106] kauditd_printk_skb: 131 callbacks suppressed [ 2098.137115] audit: type=1400 audit(2000000393.330:60925): avc: denied { map } for pid=11461 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.165813] audit: type=1400 audit(2000000393.330:60926): avc: denied { map } for pid=11461 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.188400] audit: type=1400 audit(2000000393.340:60927): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.212703] audit: type=1400 audit(2000000393.340:60928): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.236973] audit: type=1400 audit(2000000393.350:60929): avc: denied { map } for pid=11461 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.259913] audit: type=1400 audit(2000000393.350:60930): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.286635] audit: type=1400 audit(2000000393.350:60931): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.311196] audit: type=1400 audit(2000000393.360:60932): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.335456] audit: type=1400 audit(2000000393.360:60933): avc: denied { map } for pid=11461 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2098.359658] audit: type=1400 audit(2000000393.400:60934): avc: denied { map } for pid=11461 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:54 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:54 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) 03:39:54 executing program 2: syz_emit_ethernet(0x2b, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x57, 0x0, &(0x7f0000000040)}) 03:39:54 executing program 3: r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000001000002907800000000e0000001110090780000000000"], 0x0) 03:39:54 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req3={0x5809, 0x10001, 0x4, 0xffffffffffff8001, 0x40, 0x8, 0x1f}, 0x1c) inotify_init1(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9, 0xfff, 0x0, 0x1b, 0x1c, 0x1, "b964136d965c27285e975acc69dfa2f53fbc69a2e76b53ef50d1c2535c9313fab38bdc5998d6acfd5c36a321b4412765ad18debabc7c85deb85ff093e849539c", "c0df0e21cc266e44a7b09671500b94cb60d06661133374ab5042c68141df1631daabc9366489c1ba9adf55a069a3275e4a148a38f90e83d3971a9a38d44b9c80", "c4e1e84c6c4ba02955611361b6ddbbfdd7ec46e8211a9292c27c278331928e2c", [0x3f, 0x5]}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:39:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:54 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e23, 0xfff, @local, 0x20}}, 0x0, 0x1, 0x0, "7a33c3db23026f99ea55d754df654be92a3045d9d5832225c3dfff86966796020f3099399f210ad74edb14aa2c1037f940c0b1581583fffa84ca90abd03019815a097d5507f914f643a3b96a9779b4ed"}, 0xd8) syz_emit_ethernet(0x2b, &(0x7f0000000140)=ANY=[@ANYBLOB="ef70668c4b9daaaaaaaaaa3b08004500001d0000ba8d12fb03ec0f99f204327600000002907800000000e0000001110090780000000000"], 0x0) 03:39:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) times(&(0x7f0000000180)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 03:39:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x10000000000, 0x0, 0xfffffffffffffe91) dup2(r0, r1) 03:39:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:39:54 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67d83aaaaaa8aaabb08004500001d000000000002907800000000e0000001110090780000000000"], 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r2}) 03:39:55 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='attr/keycreate\x00') fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r3, r4) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x31, 0x2, 0x7, 0x1f, 0x6, 0x5, 0x6, 0x78, 0x1}) 03:39:57 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:39:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x221, 0x1, 0x0, 0x2a6) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)={0x274, r2, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x48db5a37}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x23d}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd08}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x198a6db1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4bdf514c}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x97}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x93c6b7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x65}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x4804}, 0x4000800) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@proc, 0x80, 0xfffffffffffffffe, 0x0, &(0x7f0000000080)=""/11, 0xb}, 0x40000000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000140)={0xf, 0x1f, 0x1, 0x4}, 0xf) dup2(r0, r1) 03:39:57 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:57 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) getrlimit(0xf, &(0x7f0000000040)) 03:39:57 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000040)) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000c, 0x40833, r0, 0x0) 03:39:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:39:57 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x401, 0x100, 0x1000, 0xffffffffffffff01, 0x0, 0x101, 0x100, 0x3a, 0x4}}, 0x43) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:39:57 executing program 2: syz_extract_tcp_res(&(0x7f0000000000), 0x401, 0x2) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e22, @loopback}, 0x80, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)='syzkaller0\x00', 0xff, 0x40, 0x2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x3) write$cgroup_subtree(r0, &(0x7f0000000140)={[{0x2d, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'rdma'}, {0x2f, 'cpu'}, {0x2d, 'cpu'}]}, 0x22) 03:39:58 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 03:39:58 executing program 3: syz_emit_ethernet(0x17, &(0x7f0000000180)={@random="e5c1a2e67983", @dev={[], 0xa}, [], {@llc={0x4, {@snap={0xaa, 0x1, "9922", "b1b615"}}}}}, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000001c0)="180b5758b5495eb901ba8aa6d57a88af9586e3098b500c408bd06becbda45850f2c7d60a8bb66710de60db80d907a03523af409b425251a99d0ffa3adf72cd0e1cac6f7b6afe555fec4050437062b8d816f1f30e4d9bd9e56cbc16753c48476a8d4686cd2fc8140cd0ed38156e77b12b13d148dfbe18fcec7bd43f2059bee3bf941ca9f807ec220690bd26acb29f43669a89c55931e31390cd5b31d54bdddd44c3", 0x180) 03:39:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x517080, 0x8) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)={r1}) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x80, &(0x7f0000000100)) 03:39:58 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x2) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES64=0x0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYRESDEC, @ANYBLOB="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", @ANYRES16, @ANYRES32=r0, @ANYRES64=r0, @ANYRES16=0x0]], 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') [ 2103.184275] kauditd_printk_skb: 51 callbacks suppressed [ 2103.184286] audit: type=1400 audit(2000000398.380:60986): avc: denied { create } for pid=11504 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2103.292694] audit: type=1400 audit(2000000398.420:60987): avc: denied { write } for pid=11504 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2103.364398] audit: type=1400 audit(2000000398.460:60988): avc: denied { create } for pid=11534 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2103.409495] audit: type=1400 audit(2000000398.460:60989): avc: denied { write } for pid=11534 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2103.484329] audit: type=1400 audit(2000000398.480:60990): avc: denied { map } for pid=11538 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.506800] audit: type=1400 audit(2000000398.490:60991): avc: denied { map } for pid=11540 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.534809] audit: type=1400 audit(2000000398.490:60992): avc: denied { map } for pid=11540 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.557105] audit: type=1400 audit(2000000398.490:60993): avc: denied { map } for pid=11540 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.581525] audit: type=1400 audit(2000000398.500:60994): avc: denied { map } for pid=11540 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2103.605765] audit: type=1400 audit(2000000398.500:60995): avc: denied { map } for pid=11540 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) r2 = dup2(r0, r1) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) sched_getparam(r3, &(0x7f00000000c0)) 03:40:00 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:00 executing program 2: r0 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='/\x00', 0xfffffffffffffffa) keyctl$get_security(0x11, r0, &(0x7f00000001c0)=""/255, 0xff) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20100, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000002c0)=""/202) 03:40:00 executing program 0: inotify_init1(0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x100) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x2, 0x2}) ioperm(0xa8, 0x5, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/bnep\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) write$uinput_user_dev(r1, &(0x7f00000002c0)={'syz1\x00', {0x7, 0x8, 0x2, 0x7}, 0x29, [0x3, 0x6, 0xf4b1, 0x8, 0x2, 0x3, 0xf937, 0x1, 0xffffffff, 0x20, 0xbde, 0x8, 0x3, 0x6, 0x6e7ecaa1, 0x8a, 0x800, 0x688f75f5, 0x3f, 0x5, 0xb047, 0xffff, 0x6, 0x2, 0x6, 0x8, 0x4c2, 0x3, 0x835f, 0x208, 0x800000000000000, 0x800, 0x7003, 0x7, 0x7f, 0x9, 0x200, 0x9, 0x20, 0xfffffffffffffffb, 0x7fffffff, 0x20, 0xfffffffeffffffff, 0x3, 0x1, 0x4, 0x6, 0xfc, 0x93, 0x5, 0xd155, 0x7b9, 0x6, 0x3, 0x7, 0x7, 0x0, 0x7, 0xa40, 0x80000001, 0x6, 0x0, 0x180, 0x101], [0x6, 0x8001, 0x96, 0x6, 0x0, 0x7, 0x2ad, 0x8, 0x7, 0x3, 0xe58, 0xac9, 0x5, 0x9, 0x2, 0x3, 0x7, 0x9, 0x9, 0x5, 0x4, 0x1, 0x9, 0xc492, 0x6, 0x40, 0xfff, 0x1f, 0x100000001, 0x7f, 0x6, 0x20, 0x6, 0x0, 0x7f9f, 0x4, 0x3, 0x35, 0x7f00, 0xffffffffffffffff, 0xffffffff, 0x22b, 0xff, 0xffffffff, 0x4, 0x7, 0x2, 0x3, 0x8, 0x0, 0x7fffffff, 0x8000, 0x400, 0x3, 0x9, 0x7, 0x9, 0xffffffff, 0x8, 0x10001, 0x7, 0x5f, 0xfffffffffffffe01, 0x3], [0xff, 0x9fe5, 0x2, 0x5, 0xfff, 0x4, 0x63c1, 0x5, 0x80000001, 0x401, 0x8000, 0x800, 0x5, 0x8, 0x540e, 0x4, 0xb03, 0x1fffffffe0000, 0x0, 0xe2, 0xe34, 0x7ff, 0x6, 0x3, 0x6e, 0x7, 0x40, 0x8, 0x2f49, 0x400, 0x4, 0x5, 0x30a, 0x5, 0xff, 0x3, 0x1ff, 0x1, 0x1f, 0x6, 0x8, 0x0, 0x8, 0xfffffffffffffcd0, 0x89b, 0x0, 0x12, 0xfffffffffffffff8, 0x7, 0xfb, 0xfffffffffffffe01, 0x4d5, 0x3, 0x4, 0x5, 0x61, 0x8001, 0x3, 0x2, 0x4, 0x5, 0xff, 0xfffffffffffffff9, 0x80], [0x8d, 0x3, 0x5, 0x6, 0x4, 0xbceb, 0x5a2f, 0x6, 0x1000, 0xfffffffffffffffc, 0x80, 0x100000001, 0x0, 0x5d, 0x0, 0x7310, 0x5, 0x7, 0x5, 0xd6, 0xff, 0x4, 0x8, 0x0, 0x5, 0x1, 0x8, 0x5d2e, 0x5, 0x97, 0x1f, 0xa12, 0x3, 0x0, 0x1000, 0x100000000, 0x7, 0x5, 0x200, 0x3, 0xffffffffffffffff, 0xfa94, 0x100, 0x30, 0x1, 0xfffffffffffffffc, 0x7fff, 0x7, 0x8000, 0xf71e, 0x80, 0x2, 0xdb, 0x10000, 0x0, 0x7, 0x3, 0x3, 0x9, 0x2, 0x9, 0x100000000, 0xffffffffffffffdc, 0x80]}, 0x45c) 03:40:00 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000040)={@empty, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@deltfilter={0x54, 0x2d, 0x300, 0x70bd2b, 0x25dfdbfc, {0x0, r1, {0xf, 0xffff}, {0x1, 0xffff}, {0x0, 0xb}}, [@TCA_CHAIN={0x8, 0xb, 0x36}, @TCA_RATE={0x8, 0x5, {0x68, 0x3}}, @TCA_CHAIN={0x8}, @TCA_RATE={0x8, 0x5, {0x81, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0xa6}, @TCA_RATE={0x8, 0x5, {0x800, 0x8}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 03:40:00 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$addseals(r0, 0x409, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x2, 0x70, 0x7, 0x80, 0x9, 0x8, 0x0, 0xfff, 0x200, 0x1, 0x7791000, 0x9, 0x24000, 0x9, 0x510b, 0x7, 0x100, 0x2, 0xc0, 0x2, 0x8, 0x4, 0x8, 0x7f, 0x8, 0x5, 0xf1, 0x0, 0x3ff, 0xaeb0, 0xadb, 0x1f, 0x7, 0x8, 0x100, 0xe0e, 0x7, 0x9, 0x0, 0x40, 0x4, @perf_config_ext={0x1}, 0x1001, 0x7, 0x9, 0x0, 0x1f, 0x0, 0x3}) 03:40:00 executing program 3: syz_emit_ethernet(0xffffffffffffffc2, &(0x7f0000000040)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0xfffffffffffffff7, 0x1ff, 0x1}}], {@mpls_mc={0x8848, {[{0xffffffffffff5eb2, 0xfffffffffffffffe, 0x1}, {0x41f, 0x401, 0x6, 0xe01}, {0x8, 0xfffffffffffffe32, 0x81, 0x1}, {0x20, 0x8, 0x8, 0x32}, {0x6, 0x3, 0x3, 0x8001}], @ipv6={0xfffffffffffffffd, 0x6, "2ba455", 0x0, 0x3f, 0x0, @mcast2, @remote, {[@fragment={0x5c, 0x0, 0x3ff, 0x6, 0x0, 0x3, 0x65}, @dstopts={0x37, 0x0, [], [@pad1, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0xfffffffffffff800}, @pad1]}, @srh={0x0, 0x0, 0x4, 0x0, 0x9, 0x8, 0x4, [@remote]}], @udp={0x4e21, 0x4e22, 0x0, 0x0, [@guehdr={0x0, 0x7, 0x8, 0x10fd7818, 0x100}], "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"}}}}}}}, 0x0) 03:40:01 executing program 4: r0 = socket(0x18, 0x6, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 03:40:01 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0\x00', {0x2, 0x4e22, @rand_addr=0x49}}) 03:40:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x10000004, &(0x7f0000000000)=""/74, &(0x7f0000000080)=0x4a) 03:40:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x2f8) dup2(r0, r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0xff, 0x100000000, 0x1, 0x8}, {0x0, 0x10001, 0xe436, 0x9}, {0x3, 0x3f, 0x80000000000000, 0xfffffffffffffc4f}, {0xc33, 0x0, 0x4, 0x7a}, {0x7, 0x1, 0x4, 0x800}, {0x1, 0x6, 0x400, 0x3}, {0xfff, 0xfc00000000000000, 0x3f, 0x9}, {0x1, 0xa503, 0xd0a, 0x5}, {0x9, 0xef, 0x8, 0x4}]}, 0x10) 03:40:01 executing program 2: remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0xffffffffffffffe0, 0x60000) umount2(&(0x7f0000000000)='./file0\x00', 0x3) [ 2108.316588] kauditd_printk_skb: 108 callbacks suppressed [ 2108.316597] audit: type=1400 audit(2000000403.510:61104): avc: denied { map } for pid=11591 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.345060] audit: type=1400 audit(2000000403.510:61105): avc: denied { map } for pid=11591 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.367958] audit: type=1400 audit(2000000403.510:61106): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.392288] audit: type=1400 audit(2000000403.530:61107): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.418432] audit: type=1400 audit(2000000403.530:61108): avc: denied { map } for pid=11591 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.441261] audit: type=1400 audit(2000000403.530:61109): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.466179] audit: type=1400 audit(2000000403.530:61110): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.490717] audit: type=1400 audit(2000000403.550:61111): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.515295] audit: type=1400 audit(2000000403.550:61112): avc: denied { map } for pid=11591 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2108.539564] audit: type=1400 audit(2000000403.570:61113): avc: denied { map } for pid=11591 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:04 executing program 2: syz_emit_ethernet(0x2f, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, [{[], {0x8100, 0x5, 0x1, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:04 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:04 executing program 0: r0 = inotify_init1(0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000010100000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000ffffff7f0000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="0403bb2154f200", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000a70000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000060000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000020000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000ffffff7f0000000000000000000000000000000000000000"]) 03:40:04 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bcsh0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@local, 0x44, r1}) 03:40:04 executing program 4: prctl$PR_SET_PDEATHSIG(0x1, 0x36) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0xffffffec) r2 = dup2(r0, r1) r3 = getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r2, &(0x7f0000000000)={0x1f, 0x37, 0x2, {0x0, 0x81, 0x1, r3, 0x1, '.'}}, 0x1f) readahead(r1, 0xffffffffffffffcb, 0x1ff) 03:40:04 executing program 3: syz_emit_ethernet(0x550, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 03:40:04 executing program 2: r0 = getuid() ioprio_get$uid(0x0, r0) 03:40:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) r3 = accept4$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x800) getpeername$unix(r3, &(0x7f0000000000), &(0x7f0000000080)=0x6e) 03:40:04 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="2c661ea98767ed49e5c1a2e67983aaaaaaf9fbffffffffffff1a0073805f9500001d000000000002907800e20bd4f09f9d1911ac48493a2eb9c8fd159e5e30c548593bdd138400bbebd0e4029a8784bdc5aa1948693bb6b0bdc79d7b8c51e00a8606a635581ffeee84a53f5607c06e94bd10d2ae4b4b46434c91ed32efa07d951f3c1bd2d5952923f2261bb597237217a97cffa1ba4bb2a5e77cd56f3098e8ca30252c0d072dc75ddf673cb19e26d91055fdd5690de00e3adf430ef6dde549daee8b94afdcca74027dcd1575c474b02cd1b01c31c5ae0d782bf6680dcb2b2d8dc71b25cd767220355fa6b51aa11ec589cf351869f3aeadcd53fbd9b852"], 0x0) 03:40:04 executing program 2: syz_emit_ethernet(0xffffff2d, &(0x7f0000000100)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb81002100000d0000000500000000000000ebcb00edaacc94b511d48d7cb30e421577ca9577443c44b9f0bcab493d1775183a9ac2278f0d8a11910da0414c58e8589fbfb9420153f7b7ae7a6ba7f2"], 0x0) 03:40:04 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x9, @remote, 0x6}, 0x1c) 03:40:04 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x18, 0x3, 0x20000002006) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000001400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000000240)={0x1170, 0x7, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x7}, [@nested={0x115c, 0x5f, [@typed={0x8, 0x15, @str='+\x00'}, @generic="9ef5c02360a80c040b52c859cfc6d54da0cb1014ac364e3157cec84bd36c7fa393c52a1c54576ff9b6af3573ef62f87a79aa9e2c9d9a81410fa30848285f4bea4536ec836eee332324848bbc8ea627abdd64f16230bac1e0da0eabab3982de8991aef52300466ab16f543eb4f941760a9157cb6a93b697819a5906766108729927fd826c", @typed={0x14, 0x6d, @ipv6=@mcast1}, @typed={0x94, 0x4a, @binary="40317836599913baca655524eda898adf85b6e6aa27bfef63a59ddd1fe2545a59d3cff5e97c636cfe44de50746ff974c45c491a98b212b4eefd5e1cb08787c31ac6437609d76306ced809c11764b5dd4d97935f63587b52b52ba8d713c8ef694ef0f3c078e63e9ff504357b6f8d40ee287fcaabfa345b3272a9745fa25d8101e37b191908611e82257ca29d3a251"}, @generic="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", @typed={0x8, 0x67, @fd=r0}, @typed={0x8, 0x31, @u32=0x101}, @typed={0xc, 0x1e, @u64=0x1ff3}, @typed={0x8, 0x78, @uid=r2}]}]}, 0x1170}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup2(r0, r1) getsockopt$inet6_opts(r3, 0x29, 0x2b, &(0x7f0000000000)=""/218, &(0x7f0000000100)=0xda) 03:40:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:07 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) rt_sigreturn() creat(&(0x7f0000000100)='./file0\x00', 0x8) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/member\x00', 0x2, 0x0) 03:40:07 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, r0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:07 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) 03:40:07 executing program 2: syz_emit_ethernet(0xffffff6c, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983ffffffffffff08004500001d000000000002907800000000e0000001110090780000000000"], 0x0) 03:40:07 executing program 3: syz_emit_ethernet(0xfffffffffffffcc7, &(0x7f0000000140)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0x3, 0x8}], {0x8100, 0x5, 0x4, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r1 = getpid() ioprio_set$pid(0x2, r1, 0x2) fsetxattr$security_smack_entry(r0, &(0x7f0000000200)='security.SMACK64MMAP\x00', &(0x7f0000000240)='\x00', 0x1, 0x3) r2 = getpid() ptrace$poke(0x5, r2, &(0x7f00000000c0), 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000300)={'IDLETIMER\x00'}, &(0x7f0000000340)=0x1e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) sched_getattr(r3, &(0x7f0000000080), 0x30, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x101000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f00000002c0)='bond_slave_1\x00') splice(r4, &(0x7f0000000100), r4, &(0x7f0000000180), 0x1, 0x3) 03:40:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) syncfs(r0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) 03:40:07 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffff9c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x28, 0x7, 0x1, {{0x1b, '-mime_typenodevppp0selinux,'}, 0x16}}, 0x28) syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaff01000008004500001d000000000002907800000000e0000001110090780000000000"], 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$9p(r1, &(0x7f00000001c0)="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", 0xfffffffffffffe04) 03:40:07 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000002c0)={'security\x00\x00\xba\xd8\x00 \x00'}, &(0x7f00000000c0)=0x481) 03:40:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="0c719cb0", @ANYRES16=r3, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x40}, 0x4000010) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000002c0)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0xecd0, 0x7, 0x6, 0x4, 0x8, 0x7e0000}) 03:40:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:10 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)='pids.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000601}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r2, 0x101, 0x1, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x66}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffe34}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x70, r3, 0x300, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb38a}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="40010000", @ANYRES16=r3, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x4000}, 0x0) request_key(&(0x7f00000003c0)='cifs.idmap\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='TIPCv2\x00', 0xfffffffffffffffd) r4 = request_key(&(0x7f0000000480)='pkcs7_test\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)=')vboxnet1cpusetuserlomd5sum\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, r4, r4) 03:40:10 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0xc4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80080, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)={'syz1', "6264f07ed3e15e16b983d5bfe407a0a9fc7f4e603273b0f821e3c48b29cde748b2c50cd8e7d48b60edaea61eb00c954c964fb9ffeb944a1bfe"}, 0x3d) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x6, 0x4, 0x1, r1}) inotify_init1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xffffffffffffffc1, 0x6, 0x8}, {0x2, 0x5, 0xc000000000000000, 0xd1}]}) set_thread_area(&(0x7f0000000000)={0x2, 0xffffffffffffffff, 0x6000, 0x7, 0xf8, 0x101, 0x101, 0x0, 0x80000000, 0x8}) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) 03:40:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'veth0_to_team\x00', 0x9f}) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) recvfrom(r2, &(0x7f0000000000)=""/121, 0x79, 0x0, 0x0, 0x0) 03:40:10 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2115.417063] kauditd_printk_skb: 75 callbacks suppressed [ 2115.417072] audit: type=1400 audit(2000000410.610:61189): avc: denied { create } for pid=11680 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:10 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000280)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaac0bb08004500001d000000000002907800040000000000000000907800000000000bc92d036c0b93f61c1ce9137f63c27fdbc213817cd2ad58cc6c2c31e447a8d2102d391caf853aebd65f8fdddf6b665d775159c03c9c83d4b2a497bd73a993b5fc4c0def0370ef24db7e835ad837cefc1d67d654228c6f348b02226d81c3a6fa910ca9fc6792280fd9a243a1fc3ca2b41ce5d5a18c8370b8086ad573006d5878a674b1e7d166a7631d7f8262387b771eb7e01500fcfffff16e647417cdffde7d96883c6b29152c2ee3fc7a8922334dbc6823995dacb192a03434700aff7b27d7ab6f"], 0x0) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) [ 2115.491185] audit: type=1400 audit(2000000410.630:61190): avc: denied { map } for pid=11686 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2115.580015] audit: type=1400 audit(2000000410.640:61191): avc: denied { map } for pid=11686 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2115.683401] audit: type=1400 audit(2000000410.640:61192): avc: denied { map } for pid=11686 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2115.771464] audit: type=1400 audit(2000000410.650:61193): avc: denied { write } for pid=11680 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2115.846646] audit: type=1400 audit(2000000410.670:61194): avc: denied { map } for pid=11686 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:11 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) unshare(0x40000000) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x9, @rand_addr="17857ee1a22779c84010d4a40a13661d", 0x4}, 0x1c) [ 2115.958205] audit: type=1400 audit(2000000410.670:61195): avc: denied { create } for pid=11680 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2116.045030] audit: type=1400 audit(2000000410.670:61196): avc: denied { write } for pid=11680 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:11 executing program 3: r0 = getpgrp(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, r1, 0x0, 0x5, &(0x7f0000000140)='self\x00', r2}, 0x30) syz_emit_ethernet(0x2b, &(0x7f00000000c0)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaec9aabb08004500001d000000006719d4910e42b33f00000290780000e7ffdf000001114bd00996a7"], 0x0) socketpair(0x1f, 0x801, 0xfffffffffffff9c9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r3, &(0x7f0000000040), &(0x7f0000000080)=0xc) getitimer(0x3, &(0x7f0000000280)) [ 2116.137797] audit: type=1400 audit(2000000410.730:61197): avc: denied { map } for pid=11686 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.197232] audit: type=1400 audit(2000000410.760:61198): avc: denied { map } for pid=11686 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:11 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0x5}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0xb, &(0x7f0000055000)={0x0, 0x0, 0x3}) rt_sigtimedwait(&(0x7f0000001ff8)={0x3ffff}, &(0x7f0000f0aff0), 0x0, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x10, 0x3, 0x2) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r3, r2) 03:40:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:11 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) 03:40:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:13 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") ioctl$TIOCGPTPEER(r0, 0x5441, 0xf3be) syz_emit_ethernet(0x2f, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0xb4, 0x1000, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) syz_emit_ethernet(0x8d, &(0x7f0000000180)={@broadcast, @local, [{[{0x9100, 0xfffffffffffffff8, 0x1}], {0x8100, 0x1, 0x8, 0x2}}], {@x25={0x805, {0x3, 0x7f, 0xfd, "cda76e87eba85f9812f2ae64190d21a027bca29b8e42817d05389d109d07e1ae8e33875506d5142b8e3623a2fabe085375489a4532872e9aab56ad425dea72da3ce6d782cd7118e3ee72bc12a2f843bdad581517edc208c9114a246a956db4fea97a78f38cf809a32d298b959c3448f731f50163"}}}}, &(0x7f0000000240)={0x0, 0x1, [0x8b, 0x0, 0x10f, 0xc62]}) 03:40:13 executing program 0: r0 = inotify_init1(0x800) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') fcntl$setflags(r1, 0x2, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001740)={0x0}, &(0x7f0000001780)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000018c0)=0xe8) r4 = getgid() memfd_create(&(0x7f0000001d00)=',ppp0selinux$^[', 0x4) r5 = getpid() fstat(r1, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = fcntl$getown(r0, 0x9) getresuid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)=0x0) fstat(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000001d40)={0xffffffff, 0x2, 0x1fb7, 0x5}, 0x10) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000001d80)) sendmsg$unix(r1, &(0x7f0000001cc0)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000002c0)="881b8cd9bf89c3824a161b9a2663451a01956cd069a03534ef3e6157cdeb3093778c1a225a1317fe3c19c72909345be134dea6dd1a888580b42d8bc37e63555c00a717a736f104cc40d69e18f31bb3eae9c4cf965cda74f5775624ac599d554767f06438e8a24f62a7438e75f6c5f9b0613c898dbb42bc844a2232d0d54321b33506d9920e5611ecc6877027c018c8b8c8b8819c37be9ff25daa1ff8159782fddc1a44348dad1d240f02afeda32495826aee15d2a8740593508024341a2524e1d0d58c495b2c5d7af3d33050603d5aa1c6f5b761ed86f1844e9f6b85d6a8c9183b2d92ade3744e04b2a1f879e4d3083063", 0xf1}, {&(0x7f00000003c0)="dfd24eed756494fa97a2038bf327c407750e80f798e9ba547bed1e26bb2ee8f3b76d521e11c57920b77733b372946f12ce01ab56ca6d4a4cdcb07654c98c10a4306bf9e4c2a88a674a87af7918d2eb57db95d10eb18f12ff944e4dc3e429de289e56f71777793814bfe2857da7187e1670de930cf379c282278f49d4fb3752492e65241a99c2e30302973ca82071b99f906171aa3d97d4edea6dc25b034cccd9bdcd497f34f9468f2e79135c27dafa632636c69c6a4a2f25fbd24bcb81ab8166b611f6ebd782bfbbc262c627c2fbbf73d7b0f37c57b76c972bee41b455dbb501bf62fff424", 0xe5}, {&(0x7f00000000c0)="a265226a82ee0203465bc29606963b6c7648fbee0f1c6084ab51364079945be1ba31990669c63e3763b3b4ac032fe76ab97baaa335efa61368a78231efbacd7ee0a4bb066e6ef3f5cb9f42dd7fff74203f6784c9ff08e42812b996f571c9df88f44db65191653c5798b730c64108ff4a28fe4c04d8540d6a23e16148e564eb9c37dd40d6", 0x84}, {&(0x7f00000004c0)="9eb2", 0x2}, {&(0x7f0000000500)="2e92145e7705fc871214e9e7b6a613824b55d18f6e5723c1611659ac5d4664613361ebec375e797086c64fd32715e125d7c95a535040cac3031af303cbc1998a55d3", 0x42}, {&(0x7f0000000580)="e264fd21f671563e9a2c3df28ef689c2511ab2bbe6e3690906739d2e66f7b580bb1327634b897ab594353e9f8a8742db4ca177bb2e6ec357d14ec67c95a4dc9d6a1eea22048b3ac2e64d1f40268e5103f946d7095451ed31c97645432981ff0550b303f47f98e6ac6946052d27640290de5d7a78c138023fc52275041f0a2ebc3b4682fc26cfe17cbc23907deb844ac90880bff792b5c79c61be48966942c45cfd7d192bd84b1c2ae6a4a6", 0xab}, {&(0x7f0000000640)="96ec2c893f2c9c5c8379a3d8f9319fb866895603fc04c863ba0c047fea07a8b3ccd6abb86e1c8126b8e961fcdef096a1ad40e4abed4d71ba8a17562a2709bec93674e6d89143721e2b68f92493b4e9c8eea19e03aeece243915ac3d910048de7d11c315f0c159f0de235d1a71fb7b5111e180b2515ea0e3012cf2d200d60126afa4dbc6334991ceb19db263e72d5747772af9da8a4c488082b90a15083bfc324d256b0c746c41d68b1708882b76a6f4b8a244ec4c8838aba08fe28b44dc803e44362cb7776ffb3f270979fe69ebd99bf8ff0d293b3562dc2f8643fb946f221a4ac94dea5c870ff2a163c3e522927b957fb92c4f68fdc57166119d3a238dcf24bfdf5f503e7df6a10afd0df93a8d51341bc1296cfbe2fd3b0c42bfcd5c7b4ff1e980b455d726af7bd2f594ee2fee97bc9f2335a75b87700aa397180566ea7cf1e96fbf6363c5289c95242481d6b2f0808f234c1ebb0e551dd420cc94109f79f8600cce274e31fef80f6f2330507a318ec5fd719b87120fe87c3894854f27588457f753ccc862c43ba8d58348f546e4cffa259c72deafbe9ef132ebd4c153b30c7c7b27a61acbfb78bd4ed2a2ba656d2fccfb5baade83d3674a64b9dc6754561f80edb3e0180ae67f4c40e71c6e3b4c0b964ff75f3dbc2882ea704ccde862845dc9bdc914a4ee1c4f11ac9b30536dc96fd4117b2c8c7cdfc3aecfc8a5d9250b60a5af4d99cffe42d45482b8f18e6625ef1504da9f9f8677750bc1817e4c0d03a15d19b6f11488068d5ef894d71dae6be2ddad351c75a993ad83aeb7cde5fe96ec592fbb31a6c4a2cc8469b30c8edd8ea937a93791062159da6f439e7ee4842329ef51ebe01184c41d456e6e4c273a9b0061056d0de78ab83a98cfa721e0cb056e4c30a9087d5f347b67125852644881636856421291af8e6ced2e3835c9812388273883159715c1a14570c525001ff041f6965b6294d8f0349e597c63a30333da4190114c6c3884a18a978f2bc7d2a577f11190154eb8ede79c4f12f7f26f51ebb062163aa8df7ada209ce423eb4fa9fb78c3885360ed7eaef82bb1a36c5f9006954f2def88de535aeab757f41c7029c402fa9b9a11f8a9f354371e0dde1e946a1531cc51ff9ac59e7e85cffb5a1598fc906a42e22677643603a2f439464fb8b6bc1b8781a385ac45015783ea6061841695857f143f6c4618ee1193d68a5df23e7896f9660efcc254c76d3cc8fc45b83eeb18cee7d30ebfd060053bbab7773c7481155b443487069b202dbdc7107887948181d8048ffd59d8028f17bf4ce14a6ac327c9a5d7ca4c239111a00ef8ba01b2ab73574e13fc2395c20204e5c47a18504ec4bda99483c0ff93c189ccede48209d7b32b986e6c10f0da1f2cce532066fd6f44de688802f496bd2f88083ee73f4c014ce4f4da676e7c0d0c71b577ae5c1676a069a31f5c562beddace7c08c97f6d01e0ea0c735c359dcf9483bf48728faaa1c6daa394f867f6344b537c391a1a2aba1c910a0e181da01ebb43a85dee6352aa698ee7d042b675d2aed347970fbf9cd82748140e83494b04d9fd6d1f6bc239b5e31f4f1282309a9b9703223ca03d1733432698fc8671de1658db78c5ffe715589209d36fd98c1ec904ec5969235a1a21c631c0edd8249a39d7eba3c5b764d0b43cc37ec932c9ee41b58b969ccb8a82140ab8dfc73194ab672f8094931bd3f104975368c2e8197904304e3c205f7a8955bbd2a5344cbe59cf3ae37a97e342de3a80cba8e792e7880322718106e493cf53a1577018167fd1b4f5554199526f668494627c0aac08b3ecd23171d577f042bcd202fe7c0f80f4856a3e717f4ca3c0fd133d5634f80dc0354ec05b91edea70cc41ec195c82e00435573355eb9b05da9cd04739d988f24e4d02ef3ee807e9ec1632bcffc54ef1bea184424fa7371644dbf616d0e261de23f25cce19dd392fc524517d2137cc7594d1b994e140c11a5248ffa52623b214f053d654359e6efc878f9b84305ad41f8fb1cd3e229911da0635b957e5568a1d35e1bdc24c0559ce0a66335102db1f5ba7ffe59c15f49ef9f3191d60c7cc89866c0893e88cda5b4acf09d38f366782b8798e3feb05a35cd40b9eb0f0172c3ad7de878d0203e31f77d46012855b96417afa071ae1be62515f66e71d573f3a543a10f355044e0b9b151ad9dbe286683e41dab5f1b805fbedd84f176a7ba7724d0f24b61f271c5601468b8428bbabc245e8d7df520d237bf8db59c5aaba742c5119ad23cd6f723d2ae7171771c5219147f4ff5abec856ed342e608c8fd5cc5c2b6aef8960005b1926942835c6028a3d27ffadc8760c068c6ce3d19c0ef51229afc2a9d03525ddfb6aebd46ee9f9a34e416233ab978ea21401c1a6e11e8354831159e23e9514d53248beb23d7dcd6668afc5221fef1ad1b7c78373ed757273851ba9f74f0317c8c631a62d464fa66d4e4e679cc4e41cbe8cc160a36113b6ef1fe391817e6a9944290d66f5d1d081edef50c501b66320d7bb57f03c1123815e8e602fbcbf92b18e89fcd36361affd2e60deff913073e99769ef9c29a23d44b57e81b7560b043dd86576672dfaea1faff430a6de5fa989cf0fa8df810c4fc1a33ea9cdfc0a50e314080fc82f0b2d1ac28a9c32ce92891ef8d4ac817bbb89fddfcda9fbe1c19c309ddedd86db429f7e51dbed1ff049c7e17f97cce7814b731c37723ae834ec98c19df476eda0137818519509b3f7f1138b1169013578b4b623d32c308fbf469ad676aa0dfde7e99e0e58a374cffb7680d4bc0c589d8aa8445ebfc846d3c77eddf8f80ae79cb7c56aa6ba400ab08ba0d3e45889e083ff2ceb65ca1f633ebb731919ab1d7948f04ee54401c32f73434ebc9d226603139caf39b5d8780c96b6cf78bf26217962566f72366c6dda082fa24bb8b61d73effc70d267b9b7e73b083528f0c3e2b4aea5fd2163ac3836fb3595f619e135398205defb014beacc1f2e5b61ad7cde877d4f93819b67f4b993d506fc1f55655766bf4c525c4516c4ad262396d72a93e9b76b579e00660e0f74b1d389922c7ba71cae45be46f09edb01d60f70e44770ee486bb9f71ede8d6b12c786f9bc4d96cfd0b34acdec34a2bea6e7c55085b83c50285cfa89d7c51b213fda7e0ef1b3bad86e8a67cf6a5a841e54596b76dbfde2a070c350aace8bd7c7e49c4d8ae47564eeb928b6ca8cc06a02b490b0d6a1efb375b4f2e9269ea40b8196ea52f1cb3dbcdf203a0ec249d7131d01b1d85391cf7b14b5411a7c902e784d3ea695da4a76fda4ed4fcbd1f5cb8817d14722ba048ee7c3a1363c173fa6081f840fec41d77d8553581fb9b410739fc9c879902f4a32fe9c3f53e650e8f0acbfddc5917c3958c4deb39e7324e029c814764377c88a994248bad85f3980cd141655ed9a1d3e310a200369989c438ee7b5558fc61161f792e2d51788556e3b2145b9517f893fe3e0507f44bb7b9a4d885b572d186a0dc44d5efedbd0658076d0d58d4960d4595a54bdcbd3d6e859956f1702f166ae9cc08131a3a119e6113637940e9e114cf673bada31cc466ce240b6cffcc1351f28d8fc529edca0df2c21ca1e0ab5a44be81ae0e8fe79b90d09cad48b30ed753978753baab719c81d2aed4be3088832bd1f9e2808af6d85692c58654c04bd848ed2556e8a6cb2ba628c35c648a3722b07029e6f7bb2de2191e15f1936db071905fce4f6de4396f50dc5e393131d17262d41b0460238de8dac3950fd33669d4e50a25ac227251300a9915e03c034188f207e980d32353baab6f338a45f1e9b069ad120e5b8c6009b0c488bb5d2eafb75d002973114f8a40299915907406404c31cf61e6b5d9002d646d38f071c206e1927bf731bb40e3b3e2caaa73b8e0bb0e0380eed341c192361e74e67a4e3c8e68b08cb1867addfe96f50d6b011396a0e1ef58467620335ebb3554b6fbbc98773caf15ccfa8cd05e99a9d13ced070f5c0062a04247b0945f8f380c214ec0465beec66ed234daa251ed93267aefba04c73ff1eaaf23ea8dc001853e5042049e842387904374427b3238d3732e6388ad95448dce6c614247e9c04b045ecd0b0112e08d433a9c4270852693ed4e8f0a4d4e57ab7fcccc4fb43434b1dcaa19e3be9fc7798d7900fbf76f0f4f6752965d51766c293af565bae686152da6cfb48385f0adcde1866744dc88fb4bb8fe8457e4c8b1ac002f1336078df04eb8a3e08d5060580fc65caed1efc0337c660aba37d5f982693b0f1bbd68c5d74bee9cebd916ba5ce1e79090d4775b1bfb566362d0a738ef7ed006e0b3cb5684edd8c0805ca9ae9874ee974c7d157e1575da2c3bb02e6afedd8b5aa1e97a8d64f2b03e4a46dba66a45f8458e246dd1cd14d16313bff05cc5d79277e54e15b4f04fa68af32fa4e5db0e58265cc6065126cfaa49bc41d1b1d516141f089d2f453f2a958fd0433307da030f7d7bf129e27a90e8b2a78119d966771597f547b30d06f842c20cc092d07a28a5614d57458d8bc77762ffd92e97e7b49ee362a7c723163712c3b620947427dd5321ed21e7c8a0334397632134f7810c9c30f34c7d4cd9d7a9f22fb529572a86c7058f36c4ef67b3e4c87716f725456335737e21231fcbcc914647be785eec8a53bce33e112371477e79e2ddc2c72309f4f5ec1d34810bdf8312c0907f5f96efa843182f3e0b801d036934879df5df68d6d44d257d43e383aeca9efeb610fc79d4bd16e1cd2d702f9c24f72b01e9aaea34cb8750b6a4f042fb4cb24f4d590d528919f1c34dabaafdbba89d8ad085d53455ce479024c1867b85a50655b90d61ebe20eabd8fcc8ee10678397e0a0336a7a45562e0f50b81a86b23673eedc079fd44949719899a0a02c72317d1187d2c165d8c94cda174713c917ba669d5e511e78f71325ddd9fff68966764b63b6d901f64ab463340ba714a49211a264341585c547387364d1a4dfc72539fc7d048002a9529454446bf9a1435efdab35b6bf9ed2dd366e7690336e321f27a49835e5872680b976c9c52651171633fd67ce7095048f5b39c8a630ccc3de086aa559300b971ebc7a1fbd2f5a38c1e3f785e7f605a6c484a63ce6b1bf4a8d690173f8397a3889ef7b7fa7a4795fcb87fd0ee55dcb927bc5a0ffabd19f47a55d1c59883dd8dd5969cdbc1ad29982be3b05473869fac3cba14b5d0f3a3760a8c15635bfb7eaec4584f7256660bb9f4fb2c972860a7962c0d37a9ce11ecdeceac5f5634ba2df324b2f98864c89f047b7666121f663e01a8c358f522c3e16be13d4fb374f3468329700b0552318298c1936ba7f6b90dc1173c5a58d168538fc573a92bb3e9a8d9a5c3c802671d79c218932f98f4d7fa8a80b9feb9ad1f6c019a65dd7d9cd9e733db63fdd3599a66b81f6d548380d5cc2db476dda5e92655994ae7954325f4f7c323583a7b7147f0776b60ebd93fd83b7d29caef23f0f24e23e0038faeeaa2d593b1a43a5ca5bb17d5090d52779d2e4c3cdf46c2e8ca218ecf8d9ad64c0d50867bf8767e3d480b7b1235a66ee9cb81e2d802171990bc79af09cebf3c2a23d18d1d09819c7c9a0f3bee62a46c00d45bc31bfaa5b66c553d79057c446ddca5c31f5ae2e47243141d160c8389c1543bd58f4694c3cf3e632f687abef55f031a7cc9736e9d3c6b414b3ba9c64192ab445b11f4b4142d9ad1e1129900fb0165ab2d50a2267a2d5f645310cea33ca286fc3de6ed6e4ced419c612030e53064380610fe48171587a03e1e5c0d8d30cfb352beb166b50dc1cb7349030", 0x1000}, {&(0x7f0000001640)="38ff120f520d90aba1e606a60aeba550de8947e414c46aa8e7795bf4462dafb28bc213002d0966f0f25e38b168413cac6eb1ae4900367288b936fdcae39c78346e5d", 0x42}], 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="200000000000c4660100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1], 0x108, 0xc804}, 0x40) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x3f) 03:40:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="c20b899fee39ebc1700c442d7c8b8cae9273ef8b5cbd0e29b7cb475b402e26e8db80c0ac248a484de70cc6737e89c2452c344fde00ffc2c96d2a68898a229df6e34d40fbdcb68268a4cd2570491f007661fe1cbb40f1078c7d4ae9f017b734f323f841d77bd0081ba2570178664b6e527ab29f679c85e14e6fed6a47543c5d3e2c23cfebb56bdfd82e4b1d4e9aac9a185015b7b92fa8a6b846086a9f68378bb71823a7219d9ee8850a473f39682625d9b1f5f3c91c5d4f72053a7d7e0139a9", 0xbf, 0x0) r3 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='(\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r2, r3) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000001880)) r4 = socket(0x10, 0x3, 0x2) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r4) accept$unix(r4, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) socket$inet6_udp(0xa, 0x2, 0x0) 03:40:13 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:13 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x1588, &(0x7f0000000040)={@dev={[], 0x18}, @random="58b4b85c97b7", [{[], {0x8100, 0x8, 0x1000, 0x3}}], {@mpls_mc={0x8848, {[{0x7fffffff, 0x8, 0xffff}, {0x6, 0x8000, 0x4, 0x480}, {0x5, 0x25bf, 0x5, 0x2}, {0x3, 0xb6, 0x8, 0xfffffffffffffffe}], @ipv6={0x6f1d, 0x6, "4fccf4", 0x153e, 0xf7, 0x9, @mcast1, @mcast2, {[@hopopts={0x3b, 0x27, [], [@calipso={0x7, 0x20, {0x301, 0x6, 0x4, 0x7fff, [0xffffffffffffffff, 0xb9, 0x7ff]}}, @generic={0x8001, 0xe3, "372d5e4907cb30fbd61e44b88f403720050206bbc2e62479739dfa49b461e9923c82f31ba78219f0624ad12896be37a6d0299db3ba91e0dcf435f850efd32553ecf498d40a1943f5e33bdcd7c761deea32db7771d42b99caea1ee7ab53c29ae00edbcdafa350009cf7147c3a23dd9106468bdf9cffe4ea97bbbad997a62525da315a1731f80ec174f0de1c9b383b6caee2d65c111a31168cee31b4a7749b5345c1d9fa2b89d309476cfb72c52e061c1659d26a0c8a32ecd46849929a576cd93012dcf26f67ace57f3c1b7a0eb82e9b2d7dc9fd1f3b6307f70a622bee6fdd2c03324ffe"}, @jumbo={0xc2, 0x4, 0x7b}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x7f}]}, @dstopts={0x0, 0xc, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @calipso={0x7, 0x20, {0xdf9a, 0x6, 0x7, 0x10000, [0xb0ca, 0x0, 0x400]}}, @pad1, @generic={0x0, 0x22, "4ee5f80632f5beb92ff4a1e9ac391eddde076663941fbdea331c0d2be2ea9e741547"}, @pad1, @enc_lim={0x4, 0x1, 0x7}]}, @fragment={0x67, 0x0, 0x2, 0x0, 0x0, 0x8, 0x66}, @dstopts={0x0, 0x1, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xfb43}]}, @routing={0x2b, 0x2, 0x1, 0x1, 0x0, [@loopback]}, @routing={0x11, 0xc, 0x2, 0xa606, 0x0, [@mcast1, @empty, @ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x2b}, @empty, @local]}, @dstopts={0x5c, 0x200, [], [@generic={0x2, 0x1000, "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"}]}, @dstopts={0x67, 0xd, [], [@generic={0x1ff, 0x61, "6b5d8708d31e2305e9143c1201e4467dadf14e4446aea276e68cd4a11f88d550ddf846b39db368ac82050678b8baa77497e6adcb87b2a6d1186e982485c599e6c5dc81dcf0b61118183c195ec14f1015dd48854ef321ecae3303c38de5eeed9761"}, @enc_lim={0x4, 0x1, 0x8}, @pad1, @pad1, @enc_lim={0x4, 0x1, 0x9}]}, @routing={0x3f, 0x4, 0x0, 0xffffffffffffff00, 0x0, [@ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}, @srh={0x1d, 0x2, 0x4, 0x1, 0x2, 0x28, 0x6, [@mcast1]}], @gre={{0x0, 0x0, 0x1, 0x7ff, 0x0, 0xb3, 0x0, 0x1, 0x880b, 0xb2, 0x0, [], "0140a3984b8769e91ba58a75c7af29182810f33b26777d5168e8f8b1322a5cce17faa485a1c33f5f01a6628e85bb51c610c74de3adb94da79fdf933dfe7501a50f0a63e2c8bd2f58aaddd926def5faa31b6fbbfe07d1bb43920042e51e66721dfc3371c6c1e4d5a9efef812692fffa65aad2e6ccd1a8909ead3e723c8c7ba1a6d5d98314da60007d57bbff971c8fef2e1073fd28c08535f1c4d9127b5cb918df74b0b92a67ab64d892fe8bdd5cb4841e7672"}, {0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800, [0x100000001, 0x3], "d3e75bc10659833cb250cb49b7f151a94d3e52a9499c170bac32a057fa49be317c1f64327a3746e44357a2015ef0"}, {0x1000, 0x0, 0xfffffffffffffff8, 0x800, 0x0, 0x0, 0x86dd, [0x10000, 0x9a4c], "31f1a08b187a9e8e985014fcc3"}, {0x8, 0x88be, 0x2, {{0x5, 0x1, 0x7, 0x20, 0x7, 0x80, 0x2, 0x3}, 0x1, 0xffffffff}}, {0x8, 0x22eb, 0x4, {{0x8, 0x2, 0x3, 0x80000000, 0x8, 0x101, 0x7ff, 0x7f}, 0x2, 0xffffffff80000001, 0x8000, 0x8, 0x1, 0x3, 0x1, 0x4, 0x7f, 0x2}}, {0x8, 0x6558, 0x3, "585526d644397fd29b10f21791c3d8543fe7e59deb14683dd6cbc84ef6707242c51ec33807e17ab8732f9f7d09014b37902639ce42605f566ae662fbd85abd487ea08098b15369cd97363ec42cd331ee04d0192ed0cecbd7d21df695fb5b8dc642a79fc315f84f82cc63b3b159271eb1fdc01a7bd6d70084e4b3c8e75d7fa556487971ea2ecb81f7de3df1e63e0effb65063e013bc02dc0b27edce3ca3247a89457e7d0ea4be3e577867021358d1550d5a4a7ee33540d55947cf9ae6992722d8047e92387908b45137722d1373212cbc8e1d2390afc8535568e60459fec613155d7a87a7fe"}}}}}}}}, &(0x7f0000001600)={0x1, 0x4, [0x515, 0x118, 0x563, 0x6c]}) 03:40:13 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64, @ANYPTR, @ANYRESDEC, @ANYRES32], @ANYRES32, @ANYRESHEX, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16, @ANYRES32, @ANYRES16, @ANYBLOB="16cfafe382a86217abd34bc1bb8119ae61f5eaa7cc48cdd1a262c7a44f1457b5d4fb6ef6c3532f73e23a6da5fbf24aa84f79feac06e7dce37b7e4f78f671c1e97444720a73290c7a1c4b321be4d0942827000000000000001f1c6fa6ea7f1525ba4d8a44ba5a246074b8bcbf655a425ce0a5f58bddf2436ad4eb265232cfe034f74810a379ac073e6fe9e3d3815dd99e7110f11d2549f79d37f659f5f178ebb817be5cefb37101357cf06aa93231375847bd80b331e4482afe8163070b7d3b1920bce567b4a42608148093cf7685fc074faa5491cef75cf480b21ffad40f829e71186cb071ebe4f6098e9584c02994c2", @ANYRES32, @ANYBLOB="49ddeab5b61172b2296a55903613a8f6ff263149fcca91f187859c41623bbfa6f043acfa396bf1f4fa45f2dc6f05380994eb418d212195d7a0bce6fbce68416653858530fc3735f150a1456694e914cf"], @ANYRES64, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRES16], @ANYRES32, @ANYRESHEX]], 0x0) rt_sigreturn() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 03:40:13 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x802) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000040)=""/250, 0xfa}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/91, 0x5b}, {&(0x7f00000004c0)=""/110, 0x6e}], 0x6, 0x0) 03:40:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) r2 = dup3(r0, r1, 0x80000) ioctl$KDSETLED(r2, 0x4b32, 0x7fff) sendto(r0, 0x0, 0xffffff17, 0x6, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000040)={'bcsf0\x00', {0x2, 0x204e20, @multicast1}}) dup2(r0, r1) 03:40:14 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@dev, @in6=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 03:40:14 executing program 3: 03:40:14 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e679837367aaaaaaaaaabb08004500001d000000000002907800000000e0000001110090780000000000"], 0x0) 03:40:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x119000, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x224, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa00000000000000}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x71}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3f, @remote, 0x2d}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7fffffff, @loopback, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80200000000000}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4}, 0x80) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:17 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) socket$inet_tcp(0x2, 0x1, 0x0) r1 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) r3 = getegid() r4 = getpid() stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) r7 = getpgrp(0x0) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000b00)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000ac0)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c00)=0x0) r11 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0, 0x0}, &(0x7f0000000c80)=0xc) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)={0x1b0, 0x41, 0x409, 0x70bd2a, 0x25dfdbfd, "", [@generic="9a236b473677084d131b9793370087bd777e5fc924addc472035649a075f1a4616f0f03b6b3f9295694626e43f61cd815019adb3e58c82dab329c6d7bf52d0a67b515f5df73727ba205164fa4d810745fa9ea84c065b4eeadcacd4944bc86cc9b2963f35465f1d02cb3ee6dbfc58fc1b74cbdbe727675254900c80af16712d4231968d182f5f84e1e7ae396020f01c5cb1c43530e047c1ea70fca0c4be7f64d483fc33f7490abac056bee88960b82ed865236b11e96f8ae0daf049e04061791fd1ec548b74c3f3ce92f9cf98d808def45cfeeeddc193db3eef", @typed={0x8, 0xf, @str='\'\x00'}, @generic="f9150ae90e25623f39ba4200669ef522c506fe7b1b2baa58aeb4ae9e65bbfd59ea1f8baca3a545631c7ee064b6a04905749d5b87bbccecb345779a02004fbdc1c5722bc8fb660c71c13b3545d1130d28056f10a15400afb556db5b1466b7999f935d2550db58419df2f0eeea9675ff498c24511a68b23b38df377ac6463d5c43f397b96187b69472a98f73fc9f3042f97e45fd0abbb3e3c0fc792ed4baceb8e1d258d37181ee65089d4ff192c464f6", @typed={0x8, 0x44, @ipv4=@remote}, @typed={0x8, 0x2a, @str='\'\x00'}]}, 0x1b0}, {&(0x7f0000000640)={0xec, 0x16, 0x9, 0x70bd28, 0x25dfdbfd, "", [@typed={0x0, 0x76, @u64=0x2d}, @generic="4f415c969b32007803f2a71c81f087b3711aca4fd11b44f1fb8658826fe82fb916520d8c63b00a90322a79a12683bb4aa29cd4183b746b44f5168e073d38d847b8c79ca8bea022ce4b1f10d8aaf7323d43125b3c16537f5d7cefbc2786ed549dd13d6f303280c6bd176a2292da66b9aabdf6f560f4a14f337ed4a49c9c9584"]}, 0xec}], 0x269, &(0x7f0000000cc0)=[@cred={0x0, 0x1, 0x2, r12, r5, r3}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r13}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x3, 0x20044801}, 0x8000) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000040)=0x6e) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) getsockname$unix(r0, &(0x7f0000000300)=@abs, &(0x7f0000000180)=0xfffffd20) geteuid() 03:40:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)={0x7, 0x10001}) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x12, r2, 0x204, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) dup2(r0, r1) 03:40:17 executing program 0: r0 = inotify_init1(0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x8, 0x1, 0x7ff, 0x5, 0x3, 0x3e, 0x4, 0x29c, 0x40, 0x135, 0x40, 0x8, 0x38, 0x1, 0x1, 0x5, 0x5}, [{0x6474e551, 0x7fff, 0x7f, 0x0, 0x9, 0xffff, 0x2c63d909, 0x6}], "04e6a74d14555ed064705559efe71f76b396d986020d09dfa81303442f37795bbe7172f953f250c160e37b5ae948b2532f1c0201c768d24c793006fa816b62d60e549c599e6d9b4268884df90f3714e2cba692cb4d3558ea1661a17b01ab8963ed810154de76f0081b53916f493dac90817197df50487554a50b6f5ef2c23cc1f0ba9aeeae985984bc28037231041cbc71a0b166086aa85f4091066fd90059c1ba720b4db2e094f7a64cc50f7c1fffdd0de51296f51a3ccb97654ee97e6d60e6b3454514f9d7c3d2d751005643f6dd4f516eaad2", [[], [], [], []]}, 0x54c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') fsetxattr(r1, &(0x7f00000002c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000300)='TIPC\x00', 0x5, 0x2) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x0, 0x9, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x5, 0x11, 0xb}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:40:17 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2121.975789] kauditd_printk_skb: 188 callbacks suppressed [ 2121.975798] audit: type=1400 audit(2000000417.170:61387): avc: denied { create } for pid=11772 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:17 executing program 3: syz_emit_ethernet(0xfffffee8, &(0x7f0000000180)={@empty, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2122.047611] audit: type=1400 audit(2000000417.210:61389): avc: denied { write } for pid=11772 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2122.126948] audit: type=1400 audit(2000000417.210:61388): avc: denied { create } for pid=11774 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2122.213424] audit: type=1400 audit(2000000417.220:61390): avc: denied { write } for pid=11774 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2122.273810] audit: type=1400 audit(2000000417.300:61391): avc: denied { map } for pid=11785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.332027] audit: type=1400 audit(2000000417.310:61392): avc: denied { map } for pid=11784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.399540] audit: type=1400 audit(2000000417.310:61393): avc: denied { map } for pid=11784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:17 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f00000001c0)=""/4096, 0xa2a}) umount2(&(0x7f0000000040)='./file0\x00', 0x8) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000011c0)=0xc) fstat(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000002000)=@broute={'broute\x00', 0x20, 0x3, 0xd48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001280], 0x0, &(0x7f0000000080), &(0x7f0000001280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x18, 0x2, 'veth1_to_hsr\x00', 'bcsf0\x00', 'bond0\x00', 'gretap0\x00', @local, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x930, 0x930, 0x9a8, [@limit={'limit\x00', 0x20, {{0x101, 0x1, 0x3, 0x0, 0x8000, 0x1}}}, @among={'among\x00', 0x850, {{0x7, 0xbf, 0x2, {[0x533, 0x2, 0x1, 0x4, 0xe6, 0x4, 0x8e, 0x7, 0x9, 0x4, 0x6a2e, 0xfff, 0x7, 0x8ba6, 0x100000000, 0x9, 0x9671, 0xfffffffffffff300, 0x5, 0x8, 0x2, 0x9, 0x80, 0xdf4, 0x1, 0x400, 0x1f, 0x10000, 0x2, 0x800, 0x400, 0x8, 0xffffffffffffffff, 0x0, 0x80, 0x0, 0x7fffffff, 0x80, 0x7fffffff, 0x0, 0x7, 0x81, 0x5, 0x5, 0x1000, 0x9, 0x9, 0x7, 0x10001, 0x1000, 0x101, 0x8, 0x1000, 0x1ff, 0x7, 0xdae, 0x2c2, 0x3, 0x0, 0x80000001, 0x1f, 0x6, 0x3, 0x0, 0x2, 0x1, 0xffffffffffffffff, 0x8001, 0x100000000, 0x4, 0x7, 0x6, 0x4, 0x6, 0x180000000000, 0x6, 0x9, 0x8, 0x9, 0x197, 0x5742, 0x1, 0x1, 0x100000001, 0x0, 0x5, 0xe82, 0x1000, 0x0, 0x400, 0x4, 0x7fffffff, 0x8, 0x5, 0x664, 0xdec, 0x7, 0x7, 0x1, 0x0, 0x1, 0x4, 0x1f, 0x6, 0x2, 0x800, 0x1, 0x0, 0xcd, 0x2, 0x7ff, 0x4, 0x80000000, 0xffffffffffffab61, 0x1, 0x2, 0x8, 0x6, 0x7, 0x9, 0x100000001, 0x1ffe00000000, 0x4, 0x5, 0x3, 0xffffffff, 0x2, 0x4, 0xc8, 0x2, 0x1000, 0x0, 0x0, 0x1, 0x732e809f, 0x2, 0x7fffffff, 0x1f, 0x800, 0x1, 0x200, 0x1, 0x81, 0x3f, 0x10000, 0x8, 0x48, 0x8, 0x7, 0xff, 0x40, 0x81, 0x5, 0x1, 0x9, 0x7, 0x20, 0x9, 0x7, 0x9, 0x3ff, 0x101, 0x2, 0x1, 0x9, 0x100000001, 0x0, 0x0, 0x3ff, 0xcb, 0x8, 0x3ff, 0x1f, 0x80000001, 0x3, 0x7, 0x20, 0xff, 0x9, 0x7, 0x8, 0xfffffffffffffffe, 0x10000, 0x1ff, 0x401, 0xa, 0x5, 0x0, 0x3, 0x2, 0xda4, 0x3ff, 0x0, 0x5c00000, 0x7, 0x1, 0x10000000, 0x401, 0xbba, 0x3, 0x9, 0x7, 0xfff, 0x3, 0x1, 0x401, 0x47f3, 0x1000, 0x9, 0x9, 0x65b3, 0x5be, 0x5bf, 0x8001, 0x65, 0x9, 0x100000000, 0x40000000000000, 0x7, 0x5, 0x0, 0x6, 0x4, 0x5, 0xaa7e, 0x4, 0x2, 0x3, 0x2, 0x10001, 0x2, 0x1, 0x6, 0x2, 0x5a89, 0x6, 0x3, 0x4, 0x0, 0xff, 0x2, 0x10c, 0x7, 0x80000000, 0x7, 0x7fffffff, 0x0, 0x2, 0x8000, 0x1ff, 0xcd51, 0x4, 0x1200, 0x1, 0x88f, 0xfffffffffffffff7, 0x1], 0x2, [{[0x7, 0x6], @dev={0xac, 0x14, 0x14, 0xb}}, {[0x1, 0x100000001], @dev={0xac, 0x14, 0x14, 0xa}}]}, {[0x4, 0x8001, 0x0, 0xffffffff, 0x7fff, 0x7, 0x414000000, 0x8, 0x400, 0xfb0a, 0x20, 0x3ff, 0x6, 0x3f, 0x3fb8, 0x72, 0x3, 0x10001, 0x7, 0x6, 0x2, 0xd166, 0x80000001, 0x1, 0x8, 0xfffffffeffffffff, 0x1154, 0x2, 0x5, 0x7, 0x2, 0x9, 0x0, 0x80000000, 0x3, 0x800, 0x2, 0xb5, 0x100000000, 0xffffffffffffffff, 0x7f, 0x1, 0x9, 0x3f, 0x4, 0x4, 0xb13, 0x7, 0x3, 0x4, 0x3, 0x10001, 0x5, 0x1, 0x1830, 0x8, 0x1ff, 0x9, 0x200, 0x6, 0x7, 0x6, 0x1f, 0x6, 0x8, 0x0, 0x7fff, 0x400, 0x0, 0x0, 0x5a, 0xfffffffffffffffd, 0x4, 0x6, 0x7, 0x800, 0x4, 0x2, 0xec, 0x10001, 0xff, 0x4, 0x7fffffff, 0x1, 0x1f, 0xec3, 0x9, 0x9, 0x81, 0x3, 0x4, 0xffffffff, 0x5cd, 0x3, 0x9, 0x2, 0x7fffffff, 0xff, 0x2, 0x2, 0x69d7268f, 0x40, 0x0, 0x1f, 0xfff, 0x800, 0x7, 0xbf, 0x8, 0x7, 0x3, 0x0, 0x7b527918, 0x401, 0x7fffffff, 0xc3, 0x200, 0x80000000, 0xffffffffffff485b, 0xb70, 0x10001, 0x7, 0x3, 0x1, 0x8080000000000, 0x4, 0x0, 0x40, 0x8fb, 0x100, 0x3, 0x13, 0x7ff, 0x101, 0x71f, 0xffff, 0x2, 0x1, 0x2, 0x7, 0x5, 0x3, 0x7, 0x4, 0x4, 0x20, 0x9, 0x9, 0x5, 0x0, 0x0, 0x8, 0x7, 0xfffffffffffffffd, 0x1ff, 0x100000001, 0x1, 0x101, 0x20, 0x80000001, 0x0, 0x100000000, 0xbc, 0x3, 0x1, 0xa9, 0x6, 0xffffffff00000001, 0x0, 0x1, 0x2, 0x4, 0x8, 0x8, 0x4, 0x1, 0x0, 0x2, 0x3, 0x7fffffff, 0xc76, 0x2, 0x7ff, 0x1, 0x8, 0x27a9efb2, 0x100, 0x1, 0x4, 0x9, 0x7, 0x8001, 0x1, 0x5, 0x4, 0x0, 0x6, 0x1cb, 0xffff, 0x100, 0x1, 0x5, 0x100000001, 0x9, 0x10001, 0x7, 0xff3, 0xf6e, 0x2566ce08, 0xe5a, 0x4d2, 0x0, 0x883f, 0x100000000, 0x9, 0x100, 0x9, 0x7fff, 0x100000000, 0x2, 0x9, 0x1f, 0x7, 0x9, 0x7f, 0x223, 0x0, 0x2, 0x99c, 0x4, 0x6, 0x5, 0x722, 0xffff, 0x1, 0x1000, 0x9, 0xc, 0xffffffffffff017b, 0x9a3, 0x8, 0x7, 0x3, 0x100000001, 0x7fff, 0x7f, 0xa023, 0x7fffffff, 0x8, 0x9, 0x87, 0xb0, 0x7, 0x9, 0x401, 0x20, 0x5], 0x2, [{[0x100, 0x8], @rand_addr=0x7}, {[0xe98, 0x4], @loopback}]}}}}]}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x101, 0x5, 0xb48, 0x1, 0x0, "89e38096984da0d3f1057fa626d3e2a9880edd3d519e53c14ee69d6c98f559d06bdf34ad6083197978947906fbf1165af5eb83e4c58097decb826350317b3694"}}}}, {{{0x5, 0x4, 0x8100, 'veth1_to_bond\x00', 'nr0\x00', 'ip6tnl0\x00', 'bond_slave_1\x00', @link_local, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xe8, 0x118, 0x160, [@owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x6}}}, @mac={'mac\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"cae2b7a1a700253385a76f2e1c4ddff0d20acb79134a1a5ff48343f579e4"}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x1, 0x601f, 'bpq0\x00', 'syzkaller1\x00', 'bond_slave_0\x00', 'erspan0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x70, 0x138, 0x180}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x100}}}, @common=@nflog={'nflog\x00', 0x50, {{0x200, 0x7, 0x10000, 0x0, 0x0, "d737c3661cf01a2452472cfbc7af7b6481a3ccff1c42514f7fb7f4599b4919f2f476bf3bbcd59a35458c180696fcf9b34ff5bd6c8be4b99b7f947f7083e3c41e"}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x8001, 0x8001}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0xdc0) 03:40:17 executing program 2: syz_emit_ethernet(0x33, &(0x7f00000001c0)={@random="e5c1a2e67983", @random="f4a144a2241c", [{[{0x9100, 0xadb, 0x9}], {0x8100, 0xf0, 0x8, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000100)=""/3, &(0x7f0000000140)=0x3) syz_emit_ethernet(0xbb, &(0x7f0000000280)={@random="e729e3c24ca4", @broadcast, [], {@llc_tr={0x11, {@snap={0xab, 0xab, 'o@', "d2ed6c", 0x18, "c729f8a4aaacbbe4fac6264eccde4815c80879f823585ee5113b01cb38b650f5f85cf532bdb4f3492378a893e801affc193bd4a44a57a1e05cdf61f5e12b9dccec5130416ccaf687189c5a665c8b8300880b32a8c4a148b3003e731704a0011ebbebe0033e1e48f964481974a5c077b1fc730ad1b62f388e5772a7176235d9938932ffb33e1d36c9bd27e2ea78ed9ed2a41a3329cc8bfb477fe92a4c93a2ef4e33a6f955"}}}}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) [ 2122.481485] audit: type=1400 audit(2000000417.310:61394): avc: denied { map } for pid=11785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x2000000000012, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) [ 2122.618261] audit: type=1400 audit(2000000417.320:61395): avc: denied { map } for pid=11784 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.722627] audit: type=1400 audit(2000000417.320:61396): avc: denied { map } for pid=11785 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x6031, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c80300000000000040020000000000000000000068010000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000001500000000000000000000000001000000000000000000000000001d0000000000009087df000000000000000000000000000000"], @ANYBLOB="e00000010000000000000000ffffffff627269646765300000000000000000006e723000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000840000000000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000070000000200000002000000010000006000434c55535445524950000000000000000000000000000000000000000000000000000000000000000900010013002b003c0026003e00180032003e000e0039003200330031003a0002001a0000000300000001000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004552524f5200000000000000000000000000000000000000000000000000b04494d8ebc899478cbb42b5da44658bd7c764edc6d5e4b1769c25ca7049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800100100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000006000000010000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000700)={{0x0, 0x0, 0x6, 0x61baf0e3c535d25b, 0x3ff}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:18 executing program 2: syz_emit_ethernet(0x33, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0x9, 0x40, 0x4000000000000002}], {0x8100, 0x5, 0x7}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:20 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:20 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/250, 0xfa}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000140)}], 0x4}, 0x2) unlink(&(0x7f0000000040)='./file0\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0x2a}], 0x1000000000000331, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) pipe2(&(0x7f0000000140), 0x80800) 03:40:20 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = getpid() getpgrp(r0) 03:40:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0xffffffffffffffbb) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x33, @local, 0x4e24, 0x3, 'sh\x00', 0x0, 0x5, 0x55}, 0x2c) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:40:20 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$BLKRRPART(r1, 0x125f, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:20 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 03:40:20 executing program 3: syz_emit_ethernet(0xffffffffffffff50, &(0x7f0000000000)={@empty, @broadcast, [{[{0x9100, 0x6, 0x0, 0x1}], {0x8100, 0x4, 0x2, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:20 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:20 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCFLSH(r1, 0x540b, 0x3f) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) capget(&(0x7f0000000080)={0x20080522, r2}, &(0x7f00000000c0)={0x7, 0x10000, 0xfffffffffffffff7, 0x0, 0x1, 0x80000001}) 03:40:20 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e55472a93bc1a2e67983aaaaaa6601bb080044f2001d000000000002907800000000"], 0x0) 03:40:20 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) 03:40:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:21 executing program 3: syz_emit_ethernet(0x0, &(0x7f00000000c0)=ANY=[], 0x0) 03:40:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:21 executing program 0: r0 = inotify_init1(0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x1, 0x9, 0x3, 0xfffffffffffffff9}}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:21 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:gpg_exec_t:s0\x00', 0x20, 0xe180f5b881f76ec2) 03:40:21 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000040)={@random="e5c1a2e67983", @dev={[], 0xd}, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0xb, @dev={[], 0x23}, @ipv4={[], [], @broadcast}, @remote, @rand_addr="b020a6de74c14e5f99f588996d0d86fb"}}}}, 0x0) 03:40:21 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x14800, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0xa) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 03:40:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f100"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2127.164284] kauditd_printk_skb: 93 callbacks suppressed [ 2127.164294] audit: type=1400 audit(2000000422.360:61490): avc: denied { map } for pid=11884 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.209695] audit: type=1400 audit(2000000422.400:61491): avc: denied { map } for pid=11884 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.233528] audit: type=1400 audit(2000000422.400:61492): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.258900] audit: type=1400 audit(2000000422.400:61493): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.290534] audit: type=1400 audit(2000000422.410:61494): avc: denied { map } for pid=11884 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.313974] audit: type=1400 audit(2000000422.420:61495): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.339071] audit: type=1400 audit(2000000422.430:61496): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.364572] audit: type=1400 audit(2000000422.440:61497): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.389492] audit: type=1400 audit(2000000422.440:61498): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.413693] audit: type=1400 audit(2000000422.450:61499): avc: denied { map } for pid=11884 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes 03:40:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:40:23 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x9f, 0x1000, 0x0, 0xfffffffffffffd4a) dup2(r0, r1) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) 03:40:23 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x79) 03:40:23 executing program 0: inotify_init1(0x800) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x80200, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f100"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:23 executing program 2: syz_extract_tcp_res(&(0x7f0000000080)={0x41424344}, 0x3f, 0x6) syz_extract_tcp_res(&(0x7f00000000c0)={0x41424344, 0x41424344}, 0x9, 0x1) syz_emit_ethernet(0xee, &(0x7f00000001c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local, [{[], {0x8100, 0x401, 0x9, 0x2}}], {@mpls_mc={0x8848, {[{0x8, 0x7, 0x1ff, 0x2}, {0x100000001, 0x517c, 0x5, 0x5}, {0x1, 0x4, 0x2, 0x7}, {0x2, 0x2ac, 0x401, 0x3}, {0x4, 0x7fff, 0x7, 0x5}], @ipv4={{0x1c, 0x4, 0x2, 0x0, 0xc8, 0x64, 0x7ff, 0x82, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x8b, 0x11, "e4567721c8395db20c87145883f50d"}, @cipso={0x86, 0x15, 0xffffffffffffff01, [{0x7, 0xf, "411279cf3967302a52f789a81e"}]}, @timestamp={0x44, 0x8, 0x2, 0x1, 0x101, [{[], 0x12}]}, @lsrr={0x83, 0x2b, 0x4, [@remote, @rand_addr=0x800, @loopback, @multicast1, @empty, @empty, @empty, @local, @empty, @dev={0xac, 0x14, 0x14, 0x21}]}]}}, @tcp={{0x4e24, 0x4e22, r0, r1, 0x72, 0x0, 0x16, 0x80, 0x200, 0x0, 0x3, {[@exp_fastopen={0xfe, 0x4}, @window={0x3, 0x3, 0x8}, @mptcp=@synack={0x1e, 0x10, 0x1f, 0x2, 0x7, 0x4, 0x6cd}, @sack_perm={0x4, 0x2}, @window={0x3, 0x3, 0x9}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0xe, 0xf989, "f7b705befc99be50d2f3"}, @exp_smc={0xfe, 0x6}, @generic={0x0, 0xd, "f8e3863cd3bf89cb7a7da4"}, @sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) 03:40:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffff9c) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) 03:40:24 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x8c, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @empty}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x8c}}, 0x4) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000080)) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x440180, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) write$P9_RFLUSH(r4, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) 03:40:24 executing program 3: syz_emit_ethernet(0xfffffffffffffd09, &(0x7f0000000080)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0070001110090780000000000"], 0x0) set_thread_area(&(0x7f00000000c0)={0x80, 0xffffffffffffffff, 0x1000, 0x7, 0x7, 0x2, 0xffff, 0xa00000000, 0x9, 0x3}) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$selinux_validatetrans(r0, &(0x7f0000000000)={'system_u:object_r:chfn_exec_t:s0', 0x20, 'system_u:object_r:semanage_exec_t:s0', 0x20, 0x4, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x72) 03:40:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$KIOCSOUND(r1, 0x4b2f, 0x80000001) recvmmsg(r0, &(0x7f0000007300)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/30, 0x1e}, {&(0x7f0000000100)=""/74, 0x4a}, {&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/6, 0x6}], 0x5, &(0x7f00000012c0)=""/20, 0x14}, 0xea}, {{&(0x7f0000001300)=@hci, 0x80, &(0x7f00000024c0)=[{&(0x7f0000001380)=""/100, 0x64}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/52, 0x34}, {&(0x7f0000002440)=""/100, 0x64}], 0x4, &(0x7f0000002500)=""/247, 0xf7}, 0x4}, {{&(0x7f0000002600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003800)=[{&(0x7f0000002680)=""/92, 0x5c}, {&(0x7f0000002700)=""/255, 0xff}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=""/212, 0xd4}, 0x8001}, {{0x0, 0x0, &(0x7f0000005b40)=[{&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/157, 0x9d}, {&(0x7f0000004a00)=""/65, 0x41}, {&(0x7f0000004a80)=""/65, 0x41}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/44, 0x2c}], 0x6, &(0x7f0000005bc0)=""/70, 0x46}, 0x7}, {{0x0, 0x0, &(0x7f0000006dc0)=[{&(0x7f0000005c40)=""/109, 0x6d}, {&(0x7f0000005cc0)=""/4096, 0x1000}, {&(0x7f0000006cc0)=""/158, 0x9e}, {&(0x7f0000006d80)=""/30, 0x1e}], 0x4, &(0x7f0000006e00)=""/154, 0x9a}, 0x8}, {{&(0x7f0000006ec0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000007240)=[{&(0x7f0000006f40)=""/55, 0x37}, {&(0x7f0000006f80)=""/249, 0xf9}, {&(0x7f0000007080)=""/50, 0x32}, {&(0x7f00000070c0)=""/170, 0xaa}, {&(0x7f0000007180)=""/144, 0x90}], 0x5, &(0x7f00000072c0)=""/43, 0x2b}, 0x8001}], 0x6, 0x40000000, &(0x7f0000007480)) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r2) 03:40:24 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x4, 0x2, 0xffffffffffffff80, 0x6}) syz_emit_ethernet(0x2b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400000, 0x18) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000002c0)) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) signalfd(r3, &(0x7f0000000040)={0x1f}, 0x8) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000000c0)=""/128, &(0x7f0000000140)=0x80) INIT: Id "6" respawning too fast: disabled for 5 minutes 03:40:27 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) 03:40:27 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:40:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f100"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:27 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/246, 0xf6}], 0x1, 0x0) 03:40:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800040c0}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf8, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x574}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3c380000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000090}, 0x20048000) 03:40:27 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2400, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f00000001c0)={0xfffffffffffffff8, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000100)={'ip6gre0\x00', @ifru_map={0x4961, 0x42b0, 0x1, 0x9, 0x9f, 0x100}}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000040)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 03:40:27 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x81, 0x4, 0x100000000, 0x7, 0x1, 0x2}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x66, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'wlc\x00', 0x1, 0x9, 0x37}, 0x2c) io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r1, 0xfb, 0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)={0x77359400}) 03:40:27 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="bb09ff070000000000000090030000000000"], 0x0) [ 2132.188446] kauditd_printk_skb: 42 callbacks suppressed [ 2132.188456] audit: type=1400 audit(2000000427.380:61542): avc: denied { map } for pid=11936 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2132.269202] audit: type=1400 audit(2000000427.420:61543): avc: denied { map } for pid=11936 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2132.349664] audit: type=1400 audit(2000000427.450:61544): avc: denied { map } for pid=11936 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:27 executing program 3: syz_emit_ethernet(0x33, &(0x7f0000000000)={@empty, @remote, [{[{0x9100, 0x3ff, 0x6, 0x1}], {0x8100, 0x9, 0x401, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2132.394725] audit: type=1400 audit(2000000427.450:61545): avc: denied { map } for pid=11936 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2132.419265] audit: type=1400 audit(2000000427.590:61546): avc: denied { read } for pid=11930 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:27 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1c1ffffffaaaaaaaaaabb08004500001d000000000002907800000000e000d027110890780000000000"], 0x0) socketpair(0x1f, 0x7, 0xcc, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0xb0000000}, 0xc) 03:40:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {r2, r3/1000+30000}}) r4 = getpgid(0x0) r5 = getpid() tgkill(r4, r5, 0x1) dup2(r0, r1) [ 2132.489710] audit: type=1400 audit(2000000427.650:61547): avc: denied { create } for pid=11930 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2132.561969] audit: type=1400 audit(2000000427.650:61548): avc: denied { write } for pid=11930 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2132.607507] audit: type=1400 audit(2000000427.680:61549): avc: denied { map } for pid=11951 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:27 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x60100, 0x0) write$P9_RVERSION(r0, &(0x7f0000000280)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000240)={0xe324, 0x200, 0x7}, 0xc) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4041}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x410, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYRES32], 0x0) write$tun(r0, &(0x7f0000000040)={@val={0x0, 0x88f5}, @val={0x0, 0x4, 0xfffffffffffffff7, 0x5, 0x1, 0xcc39}, @llc={@llc={0x1, 0xdc, "ef", "60a7304b3d5e99e4cd71871f88f24cf042f385f84a0139cd4c43c2561d6b3eb3cf6cefdbc2387f8ce847"}}}, 0x3b) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x3, 0x9, 0x6, 0x3, 0x3}, 0x14) [ 2132.644090] audit: type=1400 audit(2000000427.690:61550): avc: denied { map } for pid=11951 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2132.678737] audit: type=1400 audit(2000000427.690:61551): avc: denied { map } for pid=11951 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @multicast1}}) dup2(r0, r1) 03:40:30 executing program 3: syz_emit_ethernet(0xfffffffffffffde3, &(0x7f0000000480)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, [{[{0x9100, 0x5, 0x7fffffff, 0x1}], {0x8100, 0x3, 0x8, 0x1}}], {@ipv6={0x86dd, {0x101, 0x6, "76e056", 0x0, 0x7f, 0x7, @rand_addr="eec4688ed8e8daaa7ce0f37b2a326605", @mcast1, {[@routing={0xff, 0x0, 0x0, 0xffffffffffffffe1, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @dev={0xfe, 0x80, [], 0x18}, @dev={0xfe, 0x80, [], 0x18}, @mcast1, @remote, @mcast2, @mcast2, @dev={0xfe, 0x80, [], 0xc}, @empty]}, @fragment={0x2b, 0x0, 0x8001, 0x80000001, 0x0, 0x3f, 0x64}], @tipc=@payload_named={{{{{0x0, 0x0, 0x81, 0x7, 0x6, 0x0, 0x1, 0x2, 0x100, 0x0, 0x3, 0x6, 0x7, 0x2, 0x6, 0x9, 0x3, 0x4e23, 0x4e22}, 0x2, 0x2}, 0x1, 0x2}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/143) 03:40:30 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:40:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r2 = dup2(r0, r1) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000000)={0xb, 0x2a, 0xf, 0x17, 0x7, 0x6, 0x0, 0x146}) 03:40:30 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f0000000040)=0x1000) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:30 executing program 2: syz_emit_ethernet(0x33, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0x9, 0x8001, 0x3}], {0x8100, 0xd1, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:30 executing program 3: syz_emit_ethernet(0x53, &(0x7f0000000100)=ANY=[@ANYBLOB="e5c1a2e679aaaaaaaaaabb910008008100340000040100a6f1bccb88ffe1b6560ac1d5c8acc4f44019e39553859db8af1a413e2aaab0912535903733fd21a0c8986b042facc7f22c70b9a28551cd25d9ea3f00"], 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x100}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0xc000}, 0x4044094) 03:40:30 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/248) 03:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000000)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) write$P9_RGETATTR(r2, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x20, {0x10, 0x3, 0x8}, 0x1c3, r3, r4, 0x9, 0xffffffffffffffe4, 0x9, 0x6, 0x5, 0x2, 0x0, 0x3, 0x1, 0x3, 0xf5, 0x7, 0x8, 0x8, 0x6}}, 0xa0) dup2(r0, r1) 03:40:30 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@remote, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000100)=@x25={0x9, @remote}, &(0x7f00000001c0)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) r4 = dup2(r2, r3) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000000000)=0x80000001) 03:40:31 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101200, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000040)=""/23) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r1) 03:40:31 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaa8f9bbb08004500001d000000000008907800000000e0000001110090780000000000"], 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp6\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in=@broadcast, 0x4e22, 0x3ff, 0x4e22, 0xbc, 0x0, 0x20, 0xa0, 0xff, r1, r2}, {0x2, 0x57e, 0xfff, 0x0, 0x5, 0x7f, 0x6, 0x3}, {0x0, 0xffffffffffffff01, 0xcc, 0x9}, 0xffffffff, 0x6e6bb2, 0x0, 0x0, 0x2, 0x1}, {{@in6=@ipv4={[], [], @rand_addr=0x5}, 0x4d5, 0xff}, 0x0, @in=@remote, 0x3501, 0x0, 0x2, 0x8, 0x80000000, 0x100000001, 0x8}}, 0xe8) 03:40:31 executing program 2: 03:40:33 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) syz_emit_ethernet(0x73, &(0x7f0000000240)={@dev={[], 0xa}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [{[], {0x8100, 0x1ff, 0x7f}}], {@llc={0x4, {@snap={0x1, 0xaa, "80", "5794cf", 0xdafe, "a0d1d12ac4610e4f6ea6c169d17ab4d6e825f6e5dd6228391145d2346ad2a72fad2b541251d4829782ed368dcd4aa8b1b71d8b42631da58e72a5b9ac94cc77c0a181a55e4b4f9e46745c7a5693cf398930003ec729bc336ca9"}}}}}, &(0x7f00000002c0)={0x0, 0x1, [0xdbe, 0xc0c, 0x512, 0x4fd]}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x9c, r1, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 03:40:33 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:40:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:33 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @mcast2, 0x4}, 0x1c) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:33 executing program 0: r0 = inotify_init1(0x0) r1 = accept(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'eql\x00', {0x2, 0x4e23, @rand_addr=0x7ff}}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00', 0x10) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000040)=0x9) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) dup2(r0, r1) ioctl$TIOCNOTTY(r2, 0x5422) 03:40:33 executing program 2: syz_emit_ethernet(0x9b, &(0x7f0000000100)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08050300ff3a4318209c6dec6fa5c29b3f36eec5d8cb7d8b3c3064a8fb71bb1eea285cd8227c91057c5207ee1d6598af821ae9c7e9b90b8db684012acdb5765f6598838a98219b2fd03f4ca95ced87bc8f41a62d5450b68f51947068d500b07d7e5915943cf62f2df2a69c768f090f48da5d57f05c1493e563dfb452044413f0c28dd57b531e48e7cbaaf654c167eafdccf306105ba66cb8815a3c06a887c4473fb8bc02953248b33f74e2ebca2cd84c20b479613d4a0f909fea091442"], 0x0) [ 2138.677401] kauditd_printk_skb: 90 callbacks suppressed [ 2138.677409] audit: type=1400 audit(2000000433.870:61642): avc: denied { create } for pid=12013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2138.754021] audit: type=1400 audit(2000000433.910:61643): avc: denied { write } for pid=12013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x8000000, 0x0, 0x0) r2 = dup2(r0, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) close(r4) syz_open_procfs(r3, &(0x7f0000000080)='fdinfo/3\x00') [ 2138.859364] audit: type=1400 audit(2000000434.030:61644): avc: denied { map } for pid=12023 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2138.936175] audit: type=1400 audit(2000000434.030:61645): avc: denied { map } for pid=12023 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2139.010525] audit: type=1400 audit(2000000434.040:61646): avc: denied { map } for pid=12023 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:34 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000"], 0x0) [ 2139.120112] audit: type=1400 audit(2000000434.040:61647): avc: denied { map } for pid=12023 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x1, [@remote]}, 0x14) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) write$apparmor_current(r2, &(0x7f0000000080)=@hat={'permhat ', 0x2, 0x5e, ['system\x00', '}@\x00']}, 0x25) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 03:40:34 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x4d, 0x4) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2139.202081] audit: type=1400 audit(2000000434.090:61648): avc: denied { map } for pid=12023 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2139.299723] audit: type=1400 audit(2000000434.100:61649): avc: denied { map } for pid=12023 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2139.389256] audit: type=1400 audit(2000000434.100:61650): avc: denied { map } for pid=12023 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2139.443060] audit: type=1400 audit(2000000434.120:61651): avc: denied { map } for pid=12023 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:34 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@dev={[], 0x1e}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@hat={'changehat ', 0x2, 0x5e, ['userppp0:selfsystem-+,keyring\x00', 'D\x9eGPLppp0\xbcppp0vboxnet1', ':{wlan0\\vmnet1system-)proc+em0vmnet0eth1-\x00', 'vboxnet1keyring-\x00', 'eth0!lo()posix_acl_access\x00', '\x00', '\x00']}, 0xa8) 03:40:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) r3 = getpgrp(0x0) r4 = geteuid() sendmsg$netlink(r0, &(0x7f00000015c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000001540)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="74040000180000082bbd7000ffdbdf25c8024f0008003d00", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="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"], 0x474}, {&(0x7f0000001640)=ANY=[@ANYBLOB="701000001c00000225bd7000fedbdf253e61d78a93d6b36f55999c8479a5bdfa887658158b5dfa34ea107d2c36f4283fcc6dd5df8f0e30cbaf86b8efc69483071f8a6e43b1aa7c9357843d65bbe7988b8c736dceaf8aa271cf97e4fcc6e0da2c1839983932b14b07ce30fee94fc5c8305b107b6e2ed867fc80a3eef9e690b4eb38717ffe85813a24bcaa88702a7de2f2e3b264f12367e4ec46f770aa0589804d35b8a0df46f32d1953e264fa5f8fb667449ef6d5a252bc7a365eb8f2d5c497cd53e8791222e5f2c5bb092161b0ae4654fe2b073132f0620b3c166aa78c7e620804f77fcdb42504e198a54b21b8f0b4219e7e633969a85cabeb827b3d2ae58318d63b7b44c5b2cce45fd73527250cce76e32986b1dcb3dd5ba26e2f6916120123318dcafd83e6b39262318d35258a687d22873c06e853db4d5df06f4d89ed194d21dfcb68a63e33f79f9c6e958195a21164469e95bcbb4f9a07d7c1c5568ef6b6b66984beae9723c676151d2a73b4c024ccbb0c44a2e9fb873aa83c959d827b600f259c81406dfb5fcf5e71a326f63132a5a3d609bf9ee9797194557d18df99682bd7f8c14712c033c83056d7a2e575eec55285a0bae7cdd130c98d17746dba406a349ba2dd4123bfc90a718516b6a6a48919eca38e128bb2f0bc059d6b9e5bea69acaaa8bd40e05ae7d96baee7ef335de3d2c5acac1ee3e7fed933aec7deb3bf1de48cd6b2b92e8dd875528004ac1d30881add4cba07e62e97a163b5b543e8e85cd9deef2e59a6d48df92370e7e7d694d4284ab564620ee4c46a325b6bfdf6208869c746f01e92f456662e5fff6a9ee12ca18a8dfb30b219074ceaf03c3d7491175e66b95d71d4009b1491da1d55ee34188ef417956107785f129997cf31ae489a25d097a19c1ee597b7d4728ac6c148cee4042b8f7139abe5884e3737aafe51bc14e687b33b3140feaffa1164b16a26dc98a6a74be9838fcaad2d1db87c118d275d8cb75105ef9b012fb2dddd3c9d1550e6a2ca7a453da463b7035815caa2de1608187225c936475c782d2f1b4e903f9dce9ece10a22d265257837137673c681584b20c9fd93737c963d3923e7d46f85d14ba2f296f3464ec916827459b797119012dff31accca238b9021364fb97e614640a11e09064e3eaf8a1afee4af0da8b54f5ffdb6944a689108ceb4b201e959feba231ef4cca7d76d2a459458282741da8e64f3fc81412f13d7310fd0bb458ba9e0f426c3bcc766fca7da8ec1f791fc2e38b77fe48f369aaed47be2138aed0d0d72bb9eb7ce97cd607045e5fa414e2279a4daa69c268d847531dd0cdd9bb62985aa9a34303d63917bf74519f5b68218f6057543f6fb0f9a5e8d7a0d178a0de4834a22fa14d8d29443ec5505f589dac3bec67e33876a40d02d45a2a4e46fc4881ec11d8110e42a8dcb1f6450fb5b6bb179590e6e0d0d5f657a82f2556ad5501bb9a256cf36caa6800577a4800f8beb02cf9b697704d2ffe6f5d177fdeeb4050acda574857213aec97b02d1e214446028a05a4bc11bc5fbc5e3e576db1bfe60193bf0dc751c1eb4cbc56a6889e22a7d4ad5100a11dbf50437fbcbf54c9ffdf3c792cc255eb1ddaa3f3c952a90662b30a8ffaf4a05726f6abb355f22853e5f41131998d3e9b130f5970923b6590c3b34d470d98efda0c2db8d4dd49b2bc1859373a981d1cd87d7140e3056603c8fd864184b22748da1cdc702532445a0e426ad3c0fe1307141704724da99992a78d9080af8478edb546e8100b3f80a7d17fc13b0319cb43cbbf3225e018b04f1620a06c913f18f75471218a96510c92d44c98b95c6874c513424f4157d6c25bf77adb9254bd3ddccf6460a0a384c5e8a1683b7d5f47527672e208ac97b33457849e0e0e96cfc331dcaef192b672b52c4a81c9570ba378c9854803bb358b6d72bb42ff83d0328e1d6a7ee83da43fc7def0db8bbc59605d9f7b54f619a6524ffdd20ff73c50345becc51f81c6355bf197457fd3cc0cbcf9254d23c82f65b6695724ebcc08763caa6dcffff6fa51114129af809e3fa13d0c74581eb2b7c861c894d3daaef823ddc90c69a3fbe712875eab864a72a3e96b026710ef2ecead99424265c39b2571d0408042e08e733dcb5186b220ad52643bfb7635a9b092fe53fea2df804f92122fd3b7c0b53b092ce57710f42a03c806dfea82b9bc4a69deb321d96c8fae3013060bb7c9ea7b6700cc2862b65f9b6af3ac127c4c805e05897b249760424684b10176f3c3ff0b4cea5c0493b0224a49fbfeb2fba881bcf467119d047346c94b441d7b89d8c7f1df6d2cd17d2772fe161960186fee3f753fe6d3641d8c45dd46577ecd500c26bdf771219b50f690c0233507cbcb39f41ef0244cdad08386825ed2b0790be1ace0276dbc241b160aec60c88404fc2eba4cb351f89ae04b57544b90a2df2933a961317387b69294b2162824e532b42a4346eeb16531650d3a55029ddd0b598e079be223a0c2952759d4ccbfff0edb93523afe057830e14a656ef55ffc2bd583636185704706baba38b7892a304bab3431f61e0e92e83f0e7a6c887b2e27c59e962c709b230e301cd7636e2e270d20cecd5cc9109a5fd0ef47e04bee6c99c7c334916a440922f616227d499e7d4542b2f624ec659bac1ab4518edc8914f5066dc90b524674a371500b0025b4b8e28fcc280948b63087c8f7030553d3573de8d34edf18c4acbb0685c7c33d8ea9f43f3314d255aba5781fee059f57f2f938a87a2b87d463da7824514ddd8d014b7afe54e46815b3db2fe05d158ebc9256a16e7b16f8f0f218d78abcd713adacee425a7e29c20784c38588a28bef675c7fd2f8d4ab0a7b49a2fd76e4e00661bf9702597c573600998cf7e780f4624b096a6ddddb8a4d8c1047a2e062e8a510336b7184f3361a2ae638dcd9946931da66f43db54e301909a66d3d6f8a801d55f37d9538b4cd64da09dd6573f3b7fdd53f6ea750005d409994622111f19d994487eae3cf7073c78fbd42ac027665b59078713405f8eeff50d1dcaba045b71994bb7496afc3b833ea06674d0f00ff3b142cc070ac7a488f0a15df923e27936ef8ffe5d4896932536993e9431c48cc4b753f049cb83f3f61bdb1af382942394f9a55a5f4e02a3620efe500deec6b1b9922aa7dd553c645c4d541855857535c2ba81dabc590adf056dec4573663d09a1d6b2c793f4e803b2134291f137b1862ae246e284b0cecf29c2ec7247280fc673fd91238a3e4055c7ea4bdbea70ef26d273d9e84aa27ed37b63435b21295a42d55678db29ccb708bab9155c099a867f8951eca6ed7d24ba9e083bb32ffd623404fb0887bcc738ccdc884bcd54e4a3ba33a5c4612c5436b765f92f941b2c06632d2f837d7c4fd673b2defe0c0c41c6937ef0c0ee3ba1cb91bb14094c3e3393445f028ce0d149869e6646e6a3b39e03e7ad611a0a474af828508df5d6498ad97befa9c9873b6df593fc516e9f284474faf632bc7595ec9ed7ad015d8af4bab62aa3688666388712ff86b414dda8d0da17bcf8e7a05c94d505a58afffff5a9399de8d091a8b805dbc2a93d7ab1421b872635390ccd9a23f0280b8baa11ea7d0c53774c6ff094048c4cddaf540258c36f7c96e72327fec9f05248029e781717ce2b3901730b75c35e4c44b64e024f46c13cef05dec5137256dfb7b13edd592917c130310686d6b4db72cb04142523558537b77504a1473b3f3812f138d27422b25c6f0c66c8db4a5a5541c6fc565b237b49c4cfcdf70b39d92d06c0856d4fe796b9950f8b27b2129a63a38073312581cee02aacb32ac72888b20e339add8e389e19cbb70a602c685a01f1f4c664748681e0a858a59db1fb856bff5558e5b278a403daeb4fca304ff0fa49465d14d45fa6f1add208eceb198722e34806d0e4a3a87e90ad9a359980775e3c851aee5d3e4fccb32f79d03ce9ca588760816b0b1d9f7b1c511427b12cb813bd0530f461388fbfc5864ac00e72db3df67fca0befadffc3d8d43b4b7d744f2615028479246012ad3096edc88edbf057ee2b690596342ed4fef24860c65b33ed0aa9f8115209e7e6faf32d88cdfec4a1e6b8a547bf51a5eb0fa1b0d08bc82a560d65ae39b8ddfc34d048f4b17b5a2dd5c885222d7fa56640904daae7c3b24293d61c1c8f07c667200b81b668a4d6cd386bdf33a33e87c5c3eb23246fe1fff5553a5a00ffb221f2d1bf801836b4632fc00b1198d1907ae9af003bd611ed886f384afd516537890c12f4abc97b7bfbe1ac1e52928b5877a405f43ac2ea3661b7fd69c9ebca6ef89b45dfbaa7e18091a8d7dc325b647926ba2f767ca6a53e328dc6b9e60fa9bf701895bdd8c6aa145ff465251a8025af275333184bfc7357117251f20b5d72dcb9b5bcccb08497d05279e4b104f28a226e0dfb7dc24fa5ce5a9e998568ecbb212d5a641dfbcfe284c6734f68a4bbd29e6e6d6f336ae3b19d4a3ba2413acafe0b2ece3cc222c9af9a7c2a6268abddb5517709254643446a74d996728c1697616440e245466f12be5a1a81fa4504e965b82f97976112088d2d7049883c800466f8c3bf7d48efc47bab21380856732c7512748e51de2658e3711ec861870777e4050bc4be6ece32d15bb6a565f8c06a914cde32a1227fd38b8e066f853c8193b81d1757cea2b7559a02bf23b63104977a030d0266fcea1ad449da939acca2a6dfeafb1762781c1a6890c39e8d1c12dbb2225383f3810d9306fa055a4dab722f6475561901052138d79cde4455a9f8dc32168528565a56f62e1847a0b679cbf35fc8623ac12af7928c9f98b3260a16c3e7d8b0a876b53223810f3cea304499992d1b1e1e22e57e2ae234688822120b36aa9c0af2a7110d7e4723d9a23f64fd250225641439cc341bc3366521749de52c3d959325d1479edfd9198df79ca44d264b7f9006829a8eaac67be2223040e1c7b3b8aeaebf1ef9b05043c577457e04acd5531eb95e9ad2d7d43d9ee480f6a924f7896b5c54fc19b5f6939e5a8b72155f6257b40e4e22d8e878525b4edb647034c24fd2eb42f1c727478a08145e0041f4599bf5dec1e70510cf3769aaaebc5584375ad49a179e5e3df7f1000bd98a6d78133b2e76789f5a791f02dbb178903e0d77dc195c1d3bd80b6f4944dbae1f95b34b3ab1cb0801023876bfb12f8cf8d5307c867291a14dc19cc0bf1d5f7d1c09c08367e156564f8bdc37e0f3920f4ad4bf48446e51266ed1f17203a6ca7a3d6f7e135451b7bf6795954e99adce534467774770336f91fc0bd9da2dd50eb6dd7aa04d5afff743dd177154af9cdd5031602fb4a9dd0f49fd7e303800b784637b0bdfd2d286db70e1e8a95adc6e37dff15bc9fe5c5c33ffa1ef3d4cadc41160a79e1a89486bb092c40ed8000125989f906b8b0781ff4b6f502b6605f8abd38b6b68d72d85ff502432c642c268b2107ac13cb716ce1a57bce83ff881edffdb31a6244989431f8308e5c12f89bea66604a9e50ec4e17ddfa8e862d607156260fdfa23f61a9f33e80ec481620e1e6d0b0cb2b70fb6483d18c7e22bd68251535bec2f9fa52b779dd509cd583a3d845daa7b8fe7cbe2d6ebd4d753e282c64d3b414d717a3924ae6d6f6647a7b98e5047fc6473099194987ca812065db3bd964a64482f47c73fb9aaf48a898e886962e0fb08cda162790df376bc75f098709189cd11f9ca8d3ad2b7fff4c81860649098e9967eb1a66bedc52dec7e502fdd347e9daccd166def626095f023bdb273b1cf48af55c3cbb02c6e4d082193e7e19e08b23cecb6a6faa79881d5edfaf1e1e81aec146d231c314000a0021a357778f28fc0042620c280d1eacb1f747f129bc7c3280921e819f9476688efcc0281c0db3852544dd56e2ef635ed7a76d9d5ebc8fc1632cb1b5eb700abbc26ff0fcd02eb1dfbfbf20841a3d70ff011b56367fb502b4d903000000"], 0x1070}], 0x2, &(0x7f0000001580)=[@rights={0x38, 0x1, 0x1, [r2, r2, r0, r0, r2, r2, r1, r1, r1, r0]}], 0x38}, 0x20000800) write$cgroup_subtree(r1, &(0x7f0000001600)=ANY=[@ANYBLOB="2d706bb201042b6d656d6f7279202d72646d61202b72646d6120"], 0x1a) 03:40:37 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:40:37 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) write$selinux_access(r0, &(0x7f0000000040)={'system_u:object_r:var_spool_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x3}, 0x45) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r2) 03:40:37 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaab439c1598d1cf334ce46ec54875b2eade92b5b7e1cbf20d30000000002907800"], 0x0) r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='eth1]%\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={r0, 0xd0a, 0xfffffffffffffff7}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'crc32c-intel\x00'}}, &(0x7f00000001c0), &(0x7f0000000200)=""/4096) 03:40:37 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:37 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x297, 0x0, 0x0, 0x26c) dup2(r1, r1) 03:40:37 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x122) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) 03:40:37 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 03:40:37 executing program 4: r0 = geteuid() quotactl(0x6, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)="72d982c9b2d1a1f731aab3487750ec1a394d109e7dcec74f0f64cd6f7e416f812fcae057199813926094f3ca051256fce48b8b309ec9d097f2b66d50ac115c6baa1e6ecc28b2beb7755199a8663e3a5213dedfede710bb63f2bbd98bb1875b4b5710a721fddb14f088a36069047facbf7df8620a7816d8775c78ae335c14503df4b0129db741779175c8c109466eac143c943d79c7f1f2a16d0281ab8137a114b8d52be2a475e18c79b9a87c472d39b7302fd18c6a8e3b44494140087948261826c8d0f3828dedf0c699ac88430ce7142e198ec3ba570c28bbd63cc7") r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x1a9, 0x800, 0x0, 0x0) dup2(r1, r2) 03:40:37 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaac7aabb08004500001d001e00000002907800000000e0000001110090780000000000"], 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0x7ff, @mcast2, 0x7b35}, {0xa, 0x4e21, 0x200, @remote, 0xe4470}, 0x4, [0x1, 0x6, 0x8000, 0xf554, 0xfff, 0x91, 0xfffffffffffffff9, 0x5]}, 0x5c) 03:40:37 executing program 3: syz_emit_ethernet(0x6, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESOCT, @ANYBLOB="ee03d4c14f53056dc6d58baaa8150134b22fc88c59552a16cd56308be452ac0188d5213c599f54051c13d3890a5f26b46ee3c1ed1d33866f51317e1160a2e36ab0c946c0b35499ef9098afdb55169038201642b5b7fd6b2e0288f42aa1211e92e5defe9c5304ce77db1444fde1a209c5ce479380d99e6d4cdebfe26c1581be637b502ae6c215cd558dcccda7f732428d6a9b3bfdd6710b6a04323e74e07d7c6626f5185b32d6a3abf81d835d285a02eb5a220922db7f30", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="a2aab1d4a8b317a9c6a10793b7d92ad0efe282202c6cf3a0e05739b41c02f5b234c435aac91006dfcef25dcf156a7a27acd3b61cd8713e12b6e1ba2da2aa2c957bfa87990362d767d9994362b047e7d7e1f2234bec688d4575429b05a6869551f96a568e27101edd1796"], @ANYRES64], 0x0) 03:40:40 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:40:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df5"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000055}, 0x20004000) r3 = socket(0x10, 0x3, 0x2) r4 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2500) r5 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x103000, 0x127) epoll_wait(r5, &(0x7f00000000c0)=[{}, {}], 0x2, 0x7ff) ioctl$EVIOCGID(r4, 0x80084502, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3d) dup2(r0, r3) 03:40:40 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4102, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x5) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x1}, 0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x7, 0x2]) ioctl$FICLONE(r0, 0x40049409, r0) syz_emit_ethernet(0x2b, &(0x7f0000000080)=ANY=[@ANYBLOB="e58ca38b90c1a2c67983aaaaaaaaaabb0800450018e0ce904a73b22c11a1001d000000000002907800000000"], 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0xd0, 0x8001}) 03:40:40 executing program 0: r0 = inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x81, 0x3, 0x0, 0x0, [{r1}, {r0, 0x0, 0x753}, {r0, 0x0, 0x1c6}]}) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:40 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000040)={@remote, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000080)=""/56) 03:40:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x5, 0xa6, 0xed, 0x3, 0x0, 0x200, 0x80, 0x8, 0x7, 0x1f, 0x8, 0x7, 0x8, 0x4, 0x8, 0xbd, 0x9, 0x9, 0xca, 0x5, 0x6, 0x3, 0x3, 0x2, 0xb5b, 0x5c66, 0x3ba0de6e, 0x1, 0x20, 0x6, 0x0, 0x6, 0x0, 0x3ff, 0x20, 0xffffffffffffffff, 0x0, 0x4, 0x7, @perf_config_ext={0x9, 0x7}, 0x2100, 0x7fffffff, 0x1, 0x1, 0x0, 0x1a00, 0x2}, r0, 0x9, 0xffffffffffffff9c, 0x8) sched_getparam(r0, &(0x7f0000000640)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) write$uinput_user_dev(r1, &(0x7f00000001c0)={'syz1\x00', {0x7f, 0xfffffffffffffff8, 0x5, 0x1}, 0x22, [0x7, 0x3, 0x100, 0x5, 0x15, 0x1, 0xbc4e, 0x100, 0xffffffffffffffff, 0x3, 0x6, 0x3, 0x0, 0x5, 0x7f, 0x1, 0x7, 0x800000000000000, 0x0, 0x200, 0x9, 0x2, 0x2, 0x6, 0x1, 0xffffffff, 0xffff, 0x400, 0x2, 0x7, 0x401, 0x92fe, 0x7, 0x6e, 0x4, 0x4, 0x2, 0x6, 0x336b, 0x9, 0x101, 0x200, 0x9, 0x7ff, 0x5a76, 0xffff, 0x6922, 0x3ff, 0x2, 0x0, 0x2, 0x7f, 0x4, 0xff, 0x2, 0xce7, 0x1, 0x2, 0x8, 0x70ee, 0x9, 0x2, 0x8, 0x8545], [0x4f23, 0x5, 0x4, 0x5, 0x8, 0x3, 0x0, 0x40, 0x80000000, 0x6, 0x7, 0x7fff, 0x5, 0x1, 0xffffffffffffffff, 0x800000, 0x7f, 0xfffffffffffffbff, 0x6, 0x7, 0x6, 0x3, 0xff, 0x7, 0x0, 0x4, 0x442, 0x5, 0x8, 0x9, 0x3, 0x400, 0x1ff, 0x20, 0x6, 0x0, 0x5, 0x1000, 0x295, 0x9, 0x6, 0x1bd, 0x80, 0x1, 0x7f, 0xe66, 0x7, 0x8, 0x0, 0x80000000, 0x2, 0xfffffffffffffffe, 0x3f, 0x8, 0x3, 0x7, 0x10001, 0x5295, 0x3, 0x4, 0x9, 0xfffffffffffffff8, 0x7fffffff, 0x3f], [0xffffffffffffffc1, 0x46b, 0x7, 0x400000, 0x9, 0x4, 0x10b63edb, 0x40, 0x9, 0x80000001, 0xffffffffffffffaf, 0x1f, 0x7, 0x4, 0x81, 0x9, 0x3f, 0x1, 0x100000001, 0x3, 0x7, 0x1, 0x6, 0xdec9, 0x7, 0x80, 0x7, 0x5a23, 0x1, 0x5, 0x3, 0x100000000, 0x7, 0x10000, 0x50b, 0x7, 0x7, 0x7ff, 0xffffffffffffffff, 0x9, 0xffffffffffffff6a, 0xff, 0x6, 0x1ff, 0x3, 0x96, 0x2, 0x21af, 0x9, 0x4, 0x5, 0x12f, 0x3, 0x7, 0x6, 0x0, 0x80000000, 0x4, 0x1, 0x6, 0x80000001, 0x80000001, 0x9, 0x8001], [0xfffffffffffffffd, 0x800, 0x100000000, 0x2c64, 0x6, 0x0, 0xffffffffffffffe0, 0x2, 0x2, 0xffff, 0x100, 0x4, 0x0, 0x3ff, 0x5, 0xfffffffffffffeff, 0x6, 0xfff, 0xfffffffffffff7a8, 0x7fff, 0x7, 0xfffffffffffff0f0, 0x100000001, 0xf9c, 0xd, 0x7, 0x2, 0xfffffffffffffffe, 0x53f, 0x0, 0x2, 0x4, 0xe6240000, 0x7, 0x6753, 0x1, 0xffffffff, 0x94, 0xffffffffffffff25, 0x400, 0x9, 0x401, 0x5, 0xffffffff7fffffff, 0x8001, 0x7, 0x0, 0x2, 0x1, 0x7b3e, 0x3, 0x5c, 0x4, 0x100000001, 0x4, 0xffffffffffffffff, 0x983, 0x100000001, 0x1ff, 0x1, 0x4, 0x800, 0x0, 0x5]}, 0x45c) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) [ 2145.340449] kauditd_printk_skb: 35 callbacks suppressed [ 2145.340458] audit: type=1400 audit(2000000440.530:61687): avc: denied { create } for pid=12092 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:40 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0000001110090781a00000000"], 0x0) [ 2145.456892] audit: type=1400 audit(2000000440.590:61688): avc: denied { write } for pid=12092 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2145.558565] audit: type=1400 audit(2000000440.720:61689): avc: denied { map } for pid=12106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2145.634220] audit: type=1400 audit(2000000440.730:61690): avc: denied { map } for pid=12106 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCCONS(r0, 0x541d) syz_emit_ethernet(0x2b, &(0x7f0000000040)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0000001110090780061ae7b910795d03c1d6bb0453c94696700000000"], 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) [ 2145.706712] audit: type=1400 audit(2000000440.740:61691): avc: denied { map } for pid=12106 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2145.807850] audit: type=1400 audit(2000000440.750:61692): avc: denied { map } for pid=12106 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df5"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2145.889028] audit: type=1400 audit(2000000440.820:61693): avc: denied { map } for pid=12106 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:41 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d00000000000290780000000000000000000000040000000000"], 0x0) 03:40:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'bcsh0\x00', 0x3}, 0x18) fsetxattr(r0, &(0x7f0000000080)=@random={'os2.', '[{,bdev\x00'}, &(0x7f00000000c0)=']eth1$\xe7nodevvboxnet0cgroup\x00', 0x1b, 0x3) r2 = dup2(r0, r1) dup2(r2, r2) [ 2145.963573] audit: type=1400 audit(2000000440.860:61694): avc: denied { map } for pid=12106 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2146.041808] audit: type=1400 audit(2000000440.870:61695): avc: denied { map } for pid=12106 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2146.103063] audit: type=1400 audit(2000000440.900:61696): avc: denied { map } for pid=12106 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1f, 0x100000000, 0x400, 0x0, 0x4, 0x1, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000140)="b48ec50b3bd4bf8f454fed0448e4c45848f531d5dbf09ff3b35cd584b30a81e1c8c6c749cb0752a3f1e96329d3cb4d952643edadeded2ce1dcdd63e4a404122c60e50646aa49c387d0b06725eadb77f5597a2d648026c61827728e967a354a3286f38744f88f5f43ca6de4b463ed9f3438c8bc448745129a354e4d697bb81955218c071871646872f48f03312c18bcd40c89aa31b9702a9b434a52d47b437ecd98765e095832b9f270176e0b777b15d18b29b76c77", &(0x7f0000000200)=""/91}, 0x18) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000a6ec51d801a0d2af00ffdbdf250200000008000000", @ANYRES32=r0], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040) r3 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x7ffe, 0x0, 0x11123600f6290e6c) dup2(r2, r3) 03:40:43 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:40:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df5"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:43 executing program 3: 03:40:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000180)=0xfff, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$sock_proto_private(r0, 0x89ee, &(0x7f00000000c0)="e011e04420dde1") preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:43 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x2040, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000380)={0x80, 0x7, 0x0, [{0xe5, 0x101, 0x0, 0x9e, 0x200, 0x7ff, 0x401}, {0x8, 0x5, 0x2, 0xef, 0x1, 0x536b, 0x8}, {0x800, 0x69, 0x401, 0x0, 0x9, 0x9, 0xa59}, {0x0, 0x4, 0xe8, 0x0, 0xffffffff, 0x3, 0x6}, {0x1000, 0x1, 0x20, 0x6, 0x9, 0xc9, 0x6}, {0x3, 0x4, 0x101, 0xcabc, 0x0, 0x1, 0x700000000}, {0x1, 0xfffffffffffffeff, 0x37, 0x1, 0x4102, 0x4, 0x1}]}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r1, 0x6}, &(0x7f00000000c0)={'enc=', 'oaep', ' hash=', {'sha3-224\x00'}}, &(0x7f00000001c0)="16f55396abe06f7861a24747e779723824080faeef3dd84fad25198555147cd3e9ea14099c781ef51ab3f032ce156161f10b76a35f7901a1e1523700ddd13312cb67249f673d0cf71a8e92b07bd8f3852617754ec3a30e12e80bb03b733bcd09fcccae2e54fe73bd1363695dfef36c3ab86041b357ded46e731eb5131c92c7cd603d15d68b7f2525ece7074da9ca50c5a738632edcc5ed5bcd480123043659aeb785d1d662613abddc52bfbed1db63e87f5feca6ec8307f28cef16086721692ba649b7d4cbb955ef8f0f34bd7fa4", &(0x7f00000002c0)=""/162) write$binfmt_script(r0, &(0x7f0000000580)={'#! ', './file0', [{0x20, '/dev/keychord\x00'}, {0x20, 'sha3-224\x00'}, {0x20, '/dev/keychord\x00'}, {0x20, 'enc='}, {0x20, 'vboxnet0'}, {}, {0x20, 'syz'}, {}, {0x20, 'oaep'}, {0x20, 'vboxnet1)*,^'}], 0xa, "a9"}, 0x5a) 03:40:43 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000100)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d00000000000290780000000000906f0000000000b1362fc00000a86eb62c96349013d991b9abb04c96a895bca89d01b5af0104e2ab5715ef648454483c1796f3a3d9f90041d9e70324fdfd3ed8dea50bde51e7e05aba5aea40787927c5f7fe5efaf9e646867234eb079cd1f605e1b3fee6d38bd9926f254787c4d04975a4db4637eae0db03b879e5799dcc5d41dbe25962052e7e5e649c93a3d37b11f0a406b41a0ad100000000000000000000000000000000000000"], 0x0) 03:40:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x20000, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x6, 0x475d, &(0x7f0000000080)={0xcf}, 0x8) 03:40:44 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/61, &(0x7f0000000080)=0x3d) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000000c0)) 03:40:44 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000240)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb080045710000000000000002907800000000e00000011100907800000000006de48e2d0fb75323c3ce499e09927cf128750916eb204078bb4c0d1ce43831cb3c1614fb6c89114904e615d1ec741004d1a2eaf1e2b9cecbc0fe494ed8e5b3d931721c59fcc3a3cff4fa4e2680b52d7efcb0fea70d6c4883aba0d77378120133bf590000387dbedb8300f18ddbd9898bd84f155a88f0bd65435a9202f4260d16691f097f"], 0x0) r0 = syz_open_pts(0xffffffffffffff9c, 0xe0e80) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x20000, 0x0) pselect6(0x40, &(0x7f0000000140)={0x1, 0x800, 0x19ff, 0x7, 0x26, 0x5, 0x1, 0xfffffffffffff000}, &(0x7f0000000180)={0x8000, 0x2, 0x0, 0x5, 0x3ff, 0x7, 0x4, 0x57f}, &(0x7f00000001c0)={0x80000000, 0x1fe, 0x3f, 0x4, 0x2, 0x5, 0x6, 0x4}, &(0x7f0000000300)={r1, r2+10000000}, &(0x7f0000000380)={&(0x7f0000000340)={0x1}, 0x8}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4080, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000003c0)={'bridge_slave_1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) lseek(r3, 0x0, 0x3) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) 03:40:44 executing program 2: syz_emit_ethernet(0xfffffffffffffcfb, &(0x7f0000000000)={@empty, @remote, [{[], {0x8100, 0x15a, 0x53, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000040)=""/228, &(0x7f0000000140)=0xe4) write$eventfd(r1, &(0x7f0000000180)=0x4, 0x8) r2 = socket(0x10, 0x3, 0x2) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:44 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x102) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x17, 0x4) 03:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x420, 0x4000012, 0x0, 0x275) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '.&\x00'}, 0x9) dup2(r0, r1) 03:40:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c9217"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:47 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x100) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x2f, @broadcast, 0x4e20, 0x2, 'nq\x00', 0x0, 0x380000000000, 0x48}, 0x2c) 03:40:47 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) write$tun(r0, &(0x7f0000000040)={@void, @val={0x1, 0x3, 0x3, 0x6, 0x8, 0x7}, @llc={@llc={0xaa, 0xfc, "25a0", "da0cf95f5ffec310e773ea2273cb21a143efa32001bf4f3b0a47a111726eedb3d3b1438cdec464e3a2f842"}}}, 0x39) 03:40:47 executing program 0: inotify_init1(0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x280, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 03:40:47 executing program 3: syz_emit_ethernet(0x33, &(0x7f0000000040)={@random="e5c1a2e67983", @empty, [{[{0x9100, 0x1f, 0x100000001, 0x3}], {0x8100, 0x2, 0x20, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:47 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) 03:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x100003, 0x40) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x0, 0x0) 03:40:47 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) 03:40:47 executing program 2: syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x2, 0x7) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0xfffffffffffffff6, &(0x7f0000000380)={@dev={[], 0x20}, @remote, [{[{0x9100, 0x1, 0x7, 0x2}], {0x8100, 0x1000, 0x100, 0x1}}], {@ipv6={0x86dd, {0x4, 0x6, "bc9ea9", 0x0, 0x2, 0x2, @mcast2, @empty, {[@dstopts={0xef, 0x0, [], [@enc_lim={0x4, 0x1, 0xfe65}]}, @fragment={0xbf, 0x0, 0x5, 0x1, 0x0, 0xb1, 0x64}, @srh={0x7f, 0x0, 0x4, 0x0, 0xfffffffffffffff9, 0x40, 0x8, [@dev={0xfe, 0x80, [], 0xd}, @rand_addr="77fc2d815dec5478c0e5495e2d41ba3b"]}], @tcp={{0x4e23, 0x4e24, r0, r1, 0x8001, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, {[@exp_smc, @fastopen={0x22, 0x0, "aa4e22"}, @timestamp={0x8, 0x0, 0x2, 0x4}, @fastopen={0x22, 0x0, "a9"}, @sack={0x5, 0x0, [0x6, 0x80000001, 0x5]}, @sack_perm, @generic={0x5, 0x0, "739483"}, @generic={0x22, 0x0, "28bf8a7f455d"}]}}, {"e0db870784713f6f2e17bdeaf9488acfbe6f3eaff219554892b8aeb5b838619b908107a4c5ff57152fecf0e0e3fbb6351a060c0412db7bd1265f4c6825351cb15c234dd468bd9d85e86d2ebe85945253a1e2a5bd1f16211848a3f2508ebae8517952c9e3eab00dba576bf8308a8aaffe5fc351608231211a0fb751f008cde402ef7e18b7261b9cb1c3a257ad760b3c5d98227decc29f0c8bee79f39ae844eff56710b844bea1dcc4f178ea43ae3e80eeada702b040dba91f65e96b396ce43ca8fc68ddef5463febe"}}}}}}}, 0x0) 03:40:47 executing program 1: clone(0x2102801ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'sy.'}, 0x0, 0xffffffffffffffff) [ 2153.216725] kauditd_printk_skb: 37 callbacks suppressed [ 2153.216730] audit: type=1400 audit(2000000448.410:61734): avc: denied { map } for pid=12214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.244430] audit: type=1400 audit(2000000448.420:61735): avc: denied { map } for pid=12214 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.267412] audit: type=1400 audit(2000000448.420:61736): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.291596] audit: type=1400 audit(2000000448.430:61737): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.320408] audit: type=1400 audit(2000000448.440:61738): avc: denied { map } for pid=12214 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.343156] audit: type=1400 audit(2000000448.450:61739): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.370924] audit: type=1400 audit(2000000448.450:61740): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.395733] audit: type=1400 audit(2000000448.470:61741): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.421641] audit: type=1400 audit(2000000448.470:61742): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2153.445848] audit: type=1400 audit(2000000448.480:61743): avc: denied { map } for pid=12214 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c9217"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}}, 0x20040810) 03:40:50 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x800, 0x2, 0x0, 0x0, 0x4007, 0x0, 0xffffffff}, 0x20) 03:40:50 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0000001112090780000000000"], 0x0) 03:40:50 executing program 3: syz_emit_ethernet(0x2f, &(0x7f0000000000)={@random="e5c1a2e67983", @dev={[], 0x2b}, [{[], {0x8100, 0x7fffffff, 0xe27}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:50 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:40:50 executing program 3: r0 = socket(0x5, 0x6, 0x80) sendto$unix(r0, &(0x7f0000000000)="36945e7b24d9572bec9e71c85697f4c91d5792d111f9193cba9a817bb46c5ed974765ce7e5f174c2f2f28b4be4f1221e0975b167ae75d72bb1e2cb80", 0x3c, 0x0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_emit_ethernet(0x2b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 03:40:50 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$poke(0x4, r0, &(0x7f0000000040), 0x5) 03:40:50 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x2240, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 03:40:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x20000000000, 0x0, 0x2d7) dup2(r0, r1) eventfd(0x7) 03:40:50 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @dev={[], 0x20}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:50 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 03:40:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c9217"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:53 executing program 3: timer_create(0x7, &(0x7f0000000000)={0x0, 0x3b, 0x4}, &(0x7f0000000040)=0x0) timer_getoverrun(r0) 03:40:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x12, 0x4) bind$netlink(r0, &(0x7f0000000000), 0xc) 03:40:53 executing program 4: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x7) r2 = socket(0x10, 0x3, 0x7) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x8001, 0x0, 0x13, 0x6, 0x0, 0x3, 0x2004, 0x1, 0x100000000, 0x3, 0x9, 0x6, 0xffffffffffff9d9d, 0x8, 0x9, 0x9, 0x8001, 0xfffffffffffffe00, 0x100000000, 0x1000, 0x400, 0x8, 0x1000, 0x0, 0x0, 0x8, 0x9, 0x4, 0x8, 0x20, 0x588b, 0x7fff, 0x0, 0x3, 0xbff, 0x83fc, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffffff9, 0x1}, 0x40, 0x1, 0x5, 0x7, 0x26c000000000, 0x0, 0xea5}, r3, 0x1, 0xffffffffffffff9c, 0x1) dup2(r1, r2) 03:40:53 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:53 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x7, 0x8200) fstat(r0, &(0x7f00000002c0)) inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) 03:40:53 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:40:53 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e6798392aaaaaaaabb08004500001d000000000002905d00000000e0000001110090780000000000"], 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x32000, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)) 03:40:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) socket$inet_udp(0x2, 0x2, 0x0) 03:40:53 executing program 1: syz_emit_ethernet(0x9b, &(0x7f0000000100)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08050300ff3a4318209c6dec6fa5c29b3f36eec5d8cb7d8b3c3064a8fb71bb1eea285cd8227c91057c5207ee1d6598af821ae9c7e9b90b8db684012acdb5765f6598838a98219b2fd03f4ca95ced87bc8f41a62d5450b68f51947068d500b07d7e5915943cf62f2df2a69c768f090f48da5d57f05c1493e563dfb452044413f0c28dd57b531e48e7cbaaf654c167eafdccf306105ba66cb8815a3c06a887c4473fb8bc02953248b33f74e2ebca2cd84c20b479613d4a0f909fea091442"], 0x0) 03:40:54 executing program 2: syz_emit_ethernet(0xffffffffffffffa1, &(0x7f0000000040)=ANY=[@ANYBLOB="0184c2000001aaaeaaaaaabb080045fabf00001d0000000000029078000053110dfe437c0000e0000001110090780000000000"], 0x0) pipe2(&(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) 03:40:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10000, 0x30) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x2f, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e22, 0x1, 'lblcr\x00', 0x0, 0xca6, 0x5f}, 0x2c) syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983001d7c000000009078000000000000000000000000"], 0x0) r1 = socket$inet(0x2, 0x0, 0x3) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200080, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)=0x4) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000000)="67b6798ba0d26004c81c03d6712110738e085b2ebabb0ccef75b979c0a3b793872555e85d1df30fbeeabaef4ce062976520a63d6d5045c5a321ca91ce386987dde6683797d0809e1e738f46acf17bd6a51086e6d0b67e639985eabcb0b22430a04940232b83403753cc8b7fa2cda90366b964898b6cfb60330dfd3b4", 0x7c) socket$nl_route(0x10, 0x3, 0x0) [ 2159.253444] kauditd_printk_skb: 71 callbacks suppressed [ 2159.253454] audit: type=1400 audit(2000000454.450:61815): avc: denied { map } for pid=12285 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.320076] audit: type=1400 audit(2000000454.450:61816): avc: denied { map } for pid=12285 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.389813] audit: type=1400 audit(2000000454.450:61817): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.442524] audit: type=1400 audit(2000000454.460:61818): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.530345] audit: type=1400 audit(2000000454.460:61819): avc: denied { map } for pid=12285 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.570130] audit: type=1400 audit(2000000454.470:61820): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.650103] audit: type=1400 audit(2000000454.470:61821): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.693421] audit: type=1400 audit(2000000454.480:61822): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.718062] audit: type=1400 audit(2000000454.480:61823): avc: denied { map } for pid=12285 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2159.742625] audit: type=1400 audit(2000000454.540:61824): avc: denied { map } for pid=12290 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:40:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @multicast1}}) dup2(r0, r1) 03:40:56 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983bb08004500001d0000000000029073cf736d746eb951479e79fcfdb23705000000000000000000000000000000"], 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 03:40:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x6, 0x80000000000fcd3) fcntl$dupfd(r1, 0x0, r1) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:40:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x600, 0x40) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xf0ff, 0x3, 0x2, 0x5, 0x18, 0x401, 0x3f48, 0x0, 0x400, 0x0, 0x1, 0x1}) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:40:56 executing program 0: inotify_init1(0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000140)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000400)={0x6e, 0x7d, 0x2, {{0x0, 0x50, 0x9, 0x2, {0x16, 0x0, 0xfffffffffffffffe}, 0x40010000, 0x5, 0x6, 0xb768, 0x2, '(]', 0x9, 'fdinfo/3\x00', 0x9, 'fdinfo/3\x00', 0x9, 'fdinfo/3\x00'}, 0x9, 'fdinfo/3\x00', r0, r1, r2}}, 0x6e) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0xa, 0x4e21, 0x1, @empty, 0x3}, 0x1c) 03:40:57 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x0, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x34}}, 0x4000010) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 03:40:57 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r0) 03:40:57 executing program 1: syz_emit_ethernet(0xffffffffffffffa1, &(0x7f0000000040)=ANY=[@ANYBLOB="0184c2000001aaaeaaaaaabb080045fabf00001d0000000000029078000053110dfe437c0000e0000001110090780000000000"], 0x0) pipe2(&(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) 03:40:57 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 03:40:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800040c0}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf8, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x574}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3c380000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000090}, 0x20048000) 03:40:57 executing program 4: r0 = socket(0x10, 0x3, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:41:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x6031, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c80300000000000040020000000000000000000068010000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000001500000000000000000000000001000000000000000000000000001d0000000000009087df000000000000000000000000000000"], @ANYBLOB="e00000010000000000000000ffffffff627269646765300000000000000000006e723000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000840000000000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000070000000200000002000000010000006000434c55535445524950000000000000000000000000000000000000000000000000000000000000000900010013002b003c0026003e00180032003e000e0039003200330031003a0002001a0000000300000001000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004552524f5200000000000000000000000000000000000000000000000000b04494d8ebc899478cbb42b5da44658bd7c764edc6d5e4b1769c25ca7049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800100100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000006000000010000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000700)={{0x0, 0x0, 0x6, 0x61baf0e3c535d25b, 0x3ff}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:00 executing program 3: syz_emit_ethernet(0x82, &(0x7f0000000000)=ANY=[@ANYBLOB="13c1a2e6798343fe67c0443088480000000000000020000000000000000044062c03026cf193bc0ab635c98033e91cee851b6a0d995fceb5407b87bf75c82b60b44565ce4401d890ee2c83650c3f5a115fe430c2eb13744f25c60fc24b1117c219746bcd534927c15d5625a10b6ad49ae67737dc964de823c8f47d4df0e83cd1b7321fa70ab27984e9a7115814a643d82dbe55cab192cfcb8d4038172dc265eeafbbb56a0fc04e5442cb993341b8c9a384767178f46883904fb059b88bcd21f3849ecaafbcc0a673eda6cb78c69657dac30fbc4e8c53ca3e8ac245a1bff5d43b7d9544e4fb84bca6cd37b8"], 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x40) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @loopback, 0x0}, &(0x7f00000001c0)=0xc) recvfrom$inet6(r0, &(0x7f0000000280)=""/214, 0xd6, 0x10000, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x401}, 0x1c) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@rand_addr="7435ba8ca4f55880dd49b12d3ba1a34d", @rand_addr="6b12188377b67c73dabde82797c6948d", @loopback, 0x8000, 0xc000, 0x2, 0x100, 0x3, 0x20, r1}) 03:41:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) r2 = accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10, 0x80000) bind(r2, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x3, 0x3, {0xa, 0x4e23, 0x1, @mcast1, 0x81}}}, 0x80) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) syslog(0xf, &(0x7f0000000000)=""/239, 0xef) 03:41:00 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x12, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="433ff70d5e039cc1f001e1f9269d81c048e1bf2ac2bfe93376ac1e38ca60e4ea6362709e7bb35b90efcbc18024220213b0eb97b4977ff89972f7d0e1aa57105cf98ccbfb9d539adc5ed5f1771a412590406dec3d24a8d3cdb12eab002b194825c54b74b40784d2cb79f1c23970df627b", 0x70, 0x0) r2 = request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='#\x00', 0xfffffffffffffffe) keyctl$negate(0xd, r1, 0x1f, r2) socket$inet(0x2, 0x5, 0x100) 03:41:00 executing program 0: r0 = inotify_init1(0x7fff9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000002c0)={0x4, {{0xa, 0x4e22, 0xffffffffffff0000, @ipv4={[], [], @empty}, 0x1f}}, {{0xa, 0x4e22, 0xff, @mcast1, 0x8}}}, 0x108) [ 2165.150400] kauditd_printk_skb: 73 callbacks suppressed [ 2165.150410] audit: type=1400 audit(2000000460.340:61898): avc: denied { syslog } for pid=12337 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:41:00 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000000)=@in6, &(0x7f0000000080)=0x80) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000004c0)) fstat(0xffffffffffffff9c, &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) gettid() getuid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) signalfd(0xffffffffffffff9c, &(0x7f0000000700), 0x8) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/user\x00', 0x2, 0x0) epoll_create1(0x80000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) accept4$inet6(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0xffffffffffffffdd, 0xf67c13cc47c29b3f) socket$inet6_tcp(0xa, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000880)='/dev/rtc0\x00', 0x80042, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x800) socket$nl_xfrm(0x10, 0x3, 0x6) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) timerfd_create(0x0, 0x800) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000c00)='/selinux/enforce\x00', 0x80000, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000c40)='/selinux/relabel\x00', 0x2, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:41:00 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e20, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x4, 0x80000001, 0x8001}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getpgid(r3) [ 2165.251276] audit: type=1400 audit(2000000460.420:61899): avc: denied { syslog } for pid=12337 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:41:00 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500008e410b68000002907800000000e0000001110090780000000000"], 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffff9c, 0x40505412, &(0x7f0000000000)={0x2, 0x6, 0x1}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(&(0x7f00000005c0)='/dev/snd/timer\x00', 0x0, 0x220000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/enforce\x00', 0x105000, 0x0) r1 = dup(r0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x1d1f364c, 0x200002) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000001c0)={0x7, {{0x2, 0x4e23, @empty}}, 0x0, 0x4, [{{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2b}}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @broadcast}}]}, 0x290) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="0300ffff7f00030001f8fff4b83f3910de41b95de5c69e325697d5007e2e18729a0eeff7008573cea84b8acd09246d57bba2c2aa4bb8fd0114a4dd5dc22205498a320c3c876f09d9b3b1b7ffa69b45f13cfb4de2f84798ac484f0d6557ae0daacbb25a7c3102cd4e7e255ce09d2141d2230b1bc6bf47b006e500d8e0c88776ba9623d7698b9d5fc09b4f74e6b37d2fecf91bf64412c86a07e101a756a78678eff0cfb734ba38cd3f9b2a3ae1d1a74d1018b6537edfd989f82fd1a0b426e9c31f46511d2cb0d45b94e2f117d3314c7002fb27ffb5d4fdcba48d7dcdc3fb8cec06b4804f8d00088a9840527f3fb76d3790b154f3529a7491e08af94465bb6ab8cccc7f8cee520649de7bdf8cebb8d8ede8964ac2a68f76c8737e06ad05b47506b2632cbb1217c300cb6817ba51a8f85eef8b32fb3468142c2855133f96e007725aa4031bfdd88506d84be9cc3d959fad594a41999d3a3a799c7bb4ab297fcb7eacb3ecfe3f26458f23ca172b5db0"], 0x10b) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000000c0)) dup2(r1, r1) 03:41:00 executing program 4: r0 = socket(0x10, 0x3, 0x2) r1 = socket(0x0, 0x4, 0x6) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x9, 0x4) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @empty}, 0x110, 0x0, 0x0, 0x0, 0x9db, 0x0, 0x8, 0x4, 0x100000000}) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000000)={0x40, 0x8}) dup2(r0, r0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) 03:41:01 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002030000000000e00000011100907800004c5101"], 0x0) set_thread_area(&(0x7f0000000000)={0x5, 0x20000000, 0x6000, 0x5, 0x3, 0x8, 0xacb, 0x4ac, 0x9, 0x785}) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000140)=0x80) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)={'security\x00', 0xd1, "d0dd70d4dc660ce3d20337d9368d00ebc7fe22b68f194863fb25913b961f0e3761e0abec5b9192d270a45aeb68c4ae34a4210e514c5aded09afc69b4c7d365073ee8ad1dc81be7dd969fd8b6b8674ff01c278af7e69249407363cb8df51c616a014d74a1545db2b907116dcad5d64cb4a18c0f3f6a6380e56f22ee195b40ba655b66219cce5e5a70f71e5dc3d09128ccbb2bd3d3681a6f76d6545f98595c99c2006c92a6532d611eb27b15365e510a389080b46fb2f5bb0c985543ef559089290c8f25d53962572ab68d8a8a3ca3c42704"}, &(0x7f0000000100)=0xf5) [ 2166.116153] audit: type=1400 audit(2000000461.310:61900): avc: denied { map } for pid=12368 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.196570] audit: type=1400 audit(2000000461.310:61901): avc: denied { map } for pid=12368 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.245287] audit: type=1400 audit(2000000461.320:61902): avc: denied { map } for pid=12368 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.282351] audit: type=1400 audit(2000000461.330:61903): avc: denied { map } for pid=12368 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.356387] audit: type=1400 audit(2000000461.350:61904): avc: denied { map } for pid=12368 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.450212] audit: type=1400 audit(2000000461.370:61905): avc: denied { map } for pid=12368 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.530632] audit: type=1400 audit(2000000461.380:61906): avc: denied { map } for pid=12368 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2166.603574] audit: type=1400 audit(2000000461.400:61907): avc: denied { map } for pid=12368 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:03 executing program 4: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:41:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x6031, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c80300000000000040020000000000000000000068010000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000001500000000000000000000000001000000000000000000000000001d0000000000009087df000000000000000000000000000000"], @ANYBLOB="e00000010000000000000000ffffffff627269646765300000000000000000006e723000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000840000000000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000070000000200000002000000010000006000434c55535445524950000000000000000000000000000000000000000000000000000000000000000900010013002b003c0026003e00180032003e000e0039003200330031003a0002001a0000000300000001000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004552524f5200000000000000000000000000000000000000000000000000b04494d8ebc899478cbb42b5da44658bd7c764edc6d5e4b1769c25ca7049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800100100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000006000000010000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000700)={{0x0, 0x0, 0x6, 0x61baf0e3c535d25b, 0x3ff}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:03 executing program 0: r0 = inotify_init1(0x0) getpgid(0xffffffffffffffff) fcntl$getown(r0, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='syscall\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:03 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5000000000002907800000000e0000001110090780000000000000000000000000000000000000000"], 0x0) 03:41:03 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$BLKRRPART(r1, 0x125f, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0x401) 03:41:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) getsockname$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) get_thread_area(&(0x7f0000000000)={0x1, 0x20000000, 0x2000, 0x100000000, 0x2, 0x8, 0x1, 0x7, 0x2, 0x6}) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000100)=""/221) dup2(r0, r1) 03:41:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x6031, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c80300000000000040020000000000000000000068010000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000001500000000000000000000000001000000000000000000000000001d0000000000009087df000000000000000000000000000000"], @ANYBLOB="e00000010000000000000000ffffffff627269646765300000000000000000006e723000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000840000000000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000070000000200000002000000010000006000434c55535445524950000000000000000000000000000000000000000000000000000000000000000900010013002b003c0026003e00180032003e000e0039003200330031003a0002001a0000000300000001000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004552524f5200000000000000000000000000000000000000000000000000b04494d8ebc899478cbb42b5da44658bd7c764edc6d5e4b1769c25ca7049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800100100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000006000000010000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000700)={{0x0, 0x0, 0x6, 0x61baf0e3c535d25b, 0x3ff}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:03 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500001d000000000002907800000000e0000001110090780000000000b562c164a4986558e778bfdc281e442313e3ff207d6018e18bf0a5414aea85ec3f9f8654bf8817562d4e23203b22542079664b31e38a107de870937cbc97c66e641731e217c787672c95aacac68ff278a51dddf33ac50e46c3bb057d92b14eb0e0e99b3f404cbfcb7b207b31dd83ff2e9477dcea545e305782207ee4690f45ee5f5833ee04fb5103b236c6658d6283b3e22b30669ba9e4cfa02e6457338e384eab3ed438e5b7290c87adc793bfb4cc9953d29b058dedb913d5bb09f62f9c06f0bf4fb448672c3b308a1f2a7b189ab3dbed39d1ae0633c1276c03829bf40bac3b783abe7a3fced098a2322ffca4bdb738f14e0f75185f492c1511d234bdc2383f8e27d8b241015a6cbe27e36e3e29fb913d025f509dcea41268c6b92bbaaa55b3dc124d12f26861b91174908ff4833feabaf99c54f0c84d99b4c999459524b4decf4d91a68d6a5fc77d970cd830f4a62adccef6cdf1e756218e8f07406b535adba3c18a79ffd2a9fb17127e65743ce938debad203e9a6b36d27940640c5f9de2f429387f2d632d29d4520102d3eea19f11220ffc8"], 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x105000, 0x0) syz_emit_ethernet(0xa4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)={0x0, 0x2, [0x5a6, 0xe65, 0x226, 0x5a7]}) sync_file_range(r0, 0x6, 0x4, 0x4) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000000)=""/30) 03:41:03 executing program 0: inotify_init1(0x80800) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000080)=""/182, &(0x7f0000000140)=0xb6) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:03 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x100000000) syz_emit_ethernet(0x2b, &(0x7f0000000080)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb080045247874dc23c161efcce4c63d0330240656e4472b3789e742f40cfe00001d000000000002907800000000e0"], 0x0) 03:41:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f00000002c0)="dc917f12be99ba71a75122f2cfca0d3ddabc5f10131837e4ca653e73f02acd5ed45ce463ac7e943a83ed890e47ff203fd51abdd80c8b30d1f32fd57901d233e62119cbdd38a2cd0e6373a77e44091179006e7d1c44ed6f5163f34b027039b91df3ae61b7ea649a0f7f80bb16ec39116850b12bba88e1f27dea9c43dd6f58fc83974bf34efa4c39fa95b6", &(0x7f0000000240)=""/116}, 0xfffffddb) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000000)=""/35) 03:41:04 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x5, &(0x7f00000000c0)={0x6}, 0x8) syz_emit_ethernet(0x2f, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e679830000000000000000029078ff9078000000000000000000000000000000000000000000000000000000"], 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x5, 0x5, {0x51, 0x81, 0x3, {0x4}, {0x6, 0x5}, @cond=[{0x2, 0x6, 0x45, 0x1, 0x3f, 0xffffffff}, {0x7, 0x400, 0x0, 0x0, 0x5, 0x9}]}, {0x0, 0xfffffffffffff001, 0x4, {0x7, 0x4}, {0x7, 0x100}, @rumble={0x40, 0x6}}}) [ 2170.307648] kauditd_printk_skb: 32 callbacks suppressed [ 2170.307658] audit: type=1400 audit(2000000465.500:61940): avc: denied { map } for pid=12418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.365059] audit: type=1400 audit(2000000465.500:61941): avc: denied { map } for pid=12418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.419393] audit: type=1400 audit(2000000465.520:61942): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.468247] audit: type=1400 audit(2000000465.520:61943): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.492437] audit: type=1400 audit(2000000465.520:61944): avc: denied { map } for pid=12418 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.516876] audit: type=1400 audit(2000000465.520:61945): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.542440] audit: type=1400 audit(2000000465.520:61946): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.568535] audit: type=1400 audit(2000000465.540:61947): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.592746] audit: type=1400 audit(2000000465.540:61948): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2170.618493] audit: type=1400 audit(2000000465.540:61949): avc: denied { map } for pid=12418 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x6031, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c80300000000000040020000000000000000000068010000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000001500000000000000000000000001000000000000000000000000001d0000000000009087df000000000000000000000000000000"], @ANYBLOB="e00000010000000000000000ffffffff627269646765300000000000000000006e723000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000840000000000000000000000000000000000e800480100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000070000000200000002000000010000006000434c55535445524950000000000000000000000000000000000000000000000000000000000000000900010013002b003c0026003e00180032003e000e0039003200330031003a0002001a0000000300000001000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d80000000000000000000000000000000000000000000000000040004552524f5200000000000000000000000000000000000000000000000000b04494d8ebc899478cbb42b5da44658bd7c764edc6d5e4b1769c25ca7049000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800100100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000006000000010000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x428) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000700)={{0x0, 0x0, 0x6, 0x61baf0e3c535d25b, 0x3ff}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:06 executing program 2: syz_emit_ethernet(0x63, &(0x7f0000000040)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0x3, 0x7, 0x4}], {0x8100, 0x200, 0x1}}], {@ipx={0x8137, {0xffff, 0x0, 0x9, 0x11, {@current, @current, 0x100}, {@broadcast, @random="ee3ee102072e", 0xc}, "59e89f3d93ad1447d6496210cf309b80af7c8bd2a8c9f19fca9c2112150ac239817f7df866809b6ebe28af0aa97a1b188b34d4929a18ea25e251a6156662116cdf033d0775db61c77f2ddd6e1aef07753997"}}}}, 0x0) 03:41:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x5e942, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000080)={@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x3, 0x2) gettid() sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup2(r1, r2) openat$cgroup_subtree(r3, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r4, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1400000000000}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004000}, 0x4c000) 03:41:06 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x119000, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x224, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa00000000000000}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x71}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3f, @remote, 0x2d}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7fffffff, @loopback, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80200000000000}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4}, 0x80) syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) 03:41:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:07 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x36) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0xffffffec) r2 = dup2(r0, r1) r3 = getpgid(0xffffffffffffffff) write$P9_RGETLOCK(r2, &(0x7f0000000000)={0x1f, 0x37, 0x2, {0x0, 0x81, 0x1, r3, 0x1, '.'}}, 0x1f) readahead(r1, 0xffffffffffffffcb, 0x1ff) 03:41:07 executing program 0: r0 = inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)=0xffff) 03:41:07 executing program 2: syz_emit_ethernet(0x29, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000040)) 03:41:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) r2 = getpgid(0xffffffffffffffff) setpriority(0x0, r2, 0x5) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:41:07 executing program 2: syz_emit_ethernet(0x1e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@can={0xc, {{0x3, 0x7000000, 0x1, 0x1}, 0x7, 0x2, 0x0, 0x0, "8f8f0c29fd9da15e"}}}}, 0x0) syz_emit_ethernet(0x81, &(0x7f0000000000)={@empty, @dev={[], 0x28}, [], {@mpls_uc={0x8847, {[{0x90, 0x43fa, 0x4, 0x82b}, {0xfffffffffffffc01, 0x539, 0x5, 0x1}, {0x800, 0x80, 0x6, 0x561}, {0x1ff, 0x7, 0x800, 0x34}, {0xfffffffeffffffff, 0x2, 0x7fffffff, 0x9}, {0x81, 0x6, 0x9, 0x7}, {0x7, 0x10000, 0xc8, 0x8}], @generic="ce86cd72940ac8f589e9f9c09a9d0458cb92f9fbd7661e2ada854a320ed09dded77f69376dc536a24e6b62218c83481e62eb93373c4827fe69d54a738ce4fa7c7ea371f917fd115bd7c5fc24f5bbca0c150c61b6e69f1e"}}}}, 0x0) 03:41:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'veth0_to_team\x00', 0x1001}) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) read(r1, &(0x7f0000000040)=""/131, 0x83) 03:41:07 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, '\x00'}}}}}, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x284, r1, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x134, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x950c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2a}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe1ba}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA={0x11c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15e4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4000000}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6e16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x10}, 0x4040800) 03:41:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) times(&(0x7f0000000180)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 03:41:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='wchan\x00') setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0xff00000000000000, 0x4) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0xfff0000000000000, 0x3d71) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80000, 0x60) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x9, 0x1) syz_emit_ethernet(0x1c4, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaa0f870c262758009100200081003c00884800000000ff000000000000000001000080000000000e00c0000c08000000008000000000800000004707018600680401010490787f000001e000000283070400000000891b01ffffffff00000000e00000027f000001e0000001000000000011c70d877f3eb6f80f21004b04cdece3009f0d4d47fdca1918b3b2136010070707000000004e244e23", @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="20500020907800042209322dd0934248b3001e0c13040500000005000000080afffffff0000000001312e4cf0f6476e090e2834021ffb855dff4275a517ae2f164572de0a500006fc395018233e090c8d2c0bca7d98c513bf485bd17326205d827d8ffe363ada60750e252726e2b3f6d5e5e1988849ba966f57d1fd165abb8cb72bbf3bd048f28b3728cfd4167cf230850808006efaa8de7b9cdd3431c3d043649594bb3d73f7633537e0ac2f1ab4567a2747aaae774b7f00fc689eef0c0b9d767eab55944fd01727c390f2ccbe6a0ca1eb1ca0d9c14d7cc7f3dbd4564b623fe18a17eb2058b91d3e1706f2093d7dbd2cfe75ae2f585e32a6a05f42bcb76001a56c15e91c88b311a79f86055f805932b16c53a566a0bc150c4e266dcb7d7e8a205774d6ac116d611cd"], &(0x7f00000002c0)={0x0, 0x1, [0x4e3, 0x1c4, 0xb87, 0xa4d]}) syz_emit_ethernet(0x40d, &(0x7f0000000440)={@random="e5c1a2e67983", @local, [{[{0x9100, 0x8, 0x1, 0x3}], {0x8100, 0x4, 0x9, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, "b4cd6a", 0x3cf, 0x9d, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, {[@fragment={0x4, 0x0, 0xb0, 0x0, 0x0, 0x3, 0x64}, @hopopts={0x0, 0x28, [], [@pad1, @generic={0x1, 0x50, "40f316bdd0e313ba92dcb89db03bab841c616bc792bb5b56297b5e46f188e1f8cee02a09aecc88b4f7d14ef6b3e6fc1d135e2e684fda7ad4ef29f279173b4e139f5d161f603b71d8b3267cc1a53a36eb"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x1, [0x0]}}, @generic={0x98e, 0x1e, "0592f3f39c3eb47e2eda2930195237e0c685394fc0d03bd21a6abddb1dee"}, @pad1, @calipso={0x7, 0x30, {0x0, 0xa, 0x1f, 0xfffffffffffffffe, [0x0, 0xc152, 0x0, 0x3ff, 0x5]}}, @generic={0x62, 0x7d, "36d6017db8ec084c7f08a63db2afbdf79e82c3666c8be4504867807a759b4dae840e079c90b5ea4b0e2908cbf3da11a5892c75b72c86caeb8e97a1540ba5aa347e659c23b5f07165fe2d130745fff2a70151a7855b152d338b3d0e95b6ced79be19bc1319d7dab1a0be13afdc87183fe452d95cac5a299814d026d1fd8"}, @jumbo={0xc2, 0x4, 0xffffffffffffffc0}]}, @routing={0x7e, 0xc, 0x3, 0x746b, 0x0, [@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @local, @mcast1, @dev={0xfe, 0x80, [], 0x1e}, @rand_addr="bcf7662afbff253262b6afabd76a0a24", @local]}, @dstopts={0x5e, 0x2d, [], [@enc_lim={0x4, 0x1, 0x1000}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @ra={0x5, 0x2, 0x2}, @calipso={0x7, 0x20, {0x6, 0x6, 0x0, 0x9, [0x9c9, 0x2, 0x3]}}, @generic={0x0, 0xa1, "f1a1c4ed0d7280804a066afb09aa3c0709a7c1349105749f17bad6ae724fd35a1a2be65c8194c66c9b3f498a9e4640cbfe5bc2f8980a8d59a993c85cb25ce6e666058b13a9d23bf2a9ef1d4b1f08edd4b3c01122c131f72f2386873acc081845a11b94e1179f4f694d17de721ef010555932c0f7ce89c2cfc0c1030e3636f73c6a659b8a48db64bb80e228f9082c8fad1d91b8f3433afb08c33afec86a0edb342b"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x80, 0x62, "060d76599a2c21f90575abf298daba8e8da3f3833e5a2e8d813d30839a015c833cab980bb5f2c452ac53e2dcd4ff81af441878c75d5e671697937e970bb01ec33a2772990d1752e4b73eb771a78750271b0148e57251e4ba83e688f4ac8ae9b3a169"}, @calipso={0x7, 0x20, {0x400, 0x6, 0x3, 0x8000, [0x4, 0x5, 0xa494]}}]}, @hopopts={0x5e, 0x0, [], [@enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x2}]}], @tcp={{0x4e23, 0x4e23, r1, r1, 0x7, 0x0, 0xe, 0x0, 0x1f, 0x0, 0x100000000, {[@eol, @exp_smc={0xfe, 0x6}, @generic={0x17, 0xa, "7ea8553ab55c41e7"}, @exp_fastopen={0xfe, 0xb, 0xf989, "fbe25e35affb0f"}, @exp_smc={0xfe, 0x6}]}}, {"59a56242dca271e8ca38aefdcbd5217f103b014e2b82551ee35f799e4f293c4e770c5e20ddb2d00ddeb611e195082a74731960cf7ff957e059b6c3ca184474e6dc27ad65774e649a72fcab42c5dbc4"}}}}}}}, 0x0) 03:41:08 executing program 2: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aa351f17c6d99025a095e4599904aaaaaaaabb080045f832bfa18d5f3d6e02907800000000"], 0x0) r0 = timerfd_create(0x0, 0x80800) r1 = socket(0x11, 0x801, 0xff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0xce, 0x0, 0x1, "6a9374451ae9268716024b1caeb34ff4", "9833874c25dbadecf18f7fe5bf2171f8cd33bc3e999f2f34a2f305c207581858439f88a25fee114a936ba768e6f8a4a53b6871ec9322daf64c251adbbbf18b191922503ab002ed3634b214518c07858d7ef8f2a6302655c63e0c0898039328e40adbf38cdd35665f70f8ce3d501992f1c79abcf153a6741a586b054d1a39b7ebebac539ae06cc78ecbeec3215dc7a09612b545619d77c738a2dd797e0114985b882a5c720b1f065024b56dffe784d812da31901cf01732b2fd"}, 0xce, 0x1) 03:41:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20400, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x8, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x12, 0x6f7, @udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x10, 0x3, 0x2) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r2, r3) 03:41:09 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 03:41:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:09 executing program 1: syz_emit_ethernet(0x2b, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb087800000000e0000001110090780000000000000000000000000000000000"], 0x0) 03:41:09 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x7f, 0x2, 0x2, 0x80000000}) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 03:41:09 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast2, @local, 0x0, 0x1, [@rand_addr]}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 03:41:09 executing program 4: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000080000000, &(0x7f0000000200)) 03:41:09 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x42000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) write$binfmt_script(r0, 0x0, 0x0) fallocate(r0, 0x40, 0x3b, 0x8) getgroups(0x0, 0x0) 03:41:09 executing program 1: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 03:41:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x400005, 0x0) 03:41:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10000, 0x18) 03:41:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "d6443024f41a"}, 0x29e, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x8) 03:41:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @empty}}}, 0x108) syz_genetlink_get_family_id$tipc2(0x0) close(r0) [ 2175.315837] kauditd_printk_skb: 147 callbacks suppressed [ 2175.315848] audit: type=1400 audit(2000000470.510:62097): avc: denied { map } for pid=12535 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.410127] audit: type=1400 audit(2000000470.510:62098): avc: denied { map } for pid=12535 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.462271] audit: type=1400 audit(2000000470.530:62099): avc: denied { map } for pid=12535 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.494368] audit: type=1400 audit(2000000470.530:62100): avc: denied { map } for pid=12535 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.532220] audit: type=1400 audit(2000000470.730:62101): avc: denied { map } for pid=12538 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.575254] audit: type=1400 audit(2000000470.750:62102): avc: denied { map } for pid=12538 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.604984] audit: type=1400 audit(2000000470.760:62103): avc: denied { map } for pid=12538 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.632105] audit: type=1400 audit(2000000470.760:62104): avc: denied { map } for pid=12538 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.656173] audit: type=1400 audit(2000000470.770:62105): avc: denied { map } for pid=12538 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2175.680900] audit: type=1400 audit(2000000470.800:62106): avc: denied { map } for pid=12538 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00\x95\xb2:F\xe4|e]S[g\xdf\x80\xffv\xcc\xb0\xaa\xb8n\xbce\x91>\x13\x90\x1c\x00v\x9a\x1f}^\x91\x86U\x8a\xf3\x8b\x9c\xf6\x8bU-\xf0\xa1\x12\xe8\xf6\xfaq0ZR\xbc\x00\'\xd1\x1eq\xb7\xe1K})\x1eK\x8b\xe8\xf9z\xf4\xce\x02h\x81\xddb\x15\x18\xe7\x91\x7f\x1e\xdb\x8e\xc5\xcf\\k\x84\xe6C/ozo\xbb\x93Ki\xe1\x82Pz\xd3c\xc7s\xee\xa7\x8e6\x97)L\xa9\xe1\xb8j\xda\xed\xb7\xd0\xd1\xc5c\xf7\xb4\xbc\x9a?o\xe8+;\xc6DR\xf5r5\x86%\x9e\xc2Y\x1a\x85k\xc2\x16}\x1e\x129#)\xcb\x1b\xe5X\v\xf27\xe0z\xb4\xed\xc0\x96\b\"\xb7\xd8e\xf4U&\x15\x14\x80\xa6/\x12\xb7^\xa5\xab\xd9\xb2\xb4\xbb\xec\x9f\r>j\xb6\x04\xe77\xa4|w55\x02\xd7\xdcp>(Gkz\x99y\xdd\xf7\x98\xd90\x1c\xe8\xe8\xe0\xbcfVo\x05\x9a\xdfC\xf7\x1e\x89QNin\fhb') 03:41:12 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7f, 0x9, 0x9, 0x8, 0x8}, 0x14) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0x2c}], 0x281, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:public_content_rw_t:s0\x00', 0x29, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000002c0)=0xc) syz_open_procfs(r1, &(0x7f0000000300)='net/rt_acct\x00') 03:41:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) sendmmsg(r0, &(0x7f000000b740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[{0x10, 0x1}], 0x10}}], 0x1, 0x0) 03:41:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:12 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x1}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 03:41:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0x0, 0xa4}) 03:41:12 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x10a00) 03:41:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev, @local}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:41:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000540)) 03:41:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) sendmmsg$unix(r1, &(0x7f0000005240)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:41:12 executing program 4: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) 03:41:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 03:41:13 executing program 0: inotify_init1(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:13 executing program 1: 03:41:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) sendmmsg$unix(r1, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r3]}], 0x18}], 0x4924924924926c2, 0x0) 03:41:13 executing program 2: 03:41:13 executing program 4: 03:41:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:13 executing program 4: 03:41:13 executing program 1: 03:41:13 executing program 2: 03:41:13 executing program 1: 03:41:13 executing program 2: 03:41:13 executing program 4: 03:41:14 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000140)={0x100000000, 0x30b7, 0x8, 0x7ff}, 0x10) inotify_init1(0x0) unshare(0x300) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x200, 0x80, 0x6, 0x0, 0x6, 0x400, 0x6, 0x3, 0x4, 0x4, 0x3f, 0x40, 0x4, 0x80000000, 0x8, 0xca, 0x101, 0x4, 0x6, 0xffff, 0xff, 0x2, 0x2b0, 0x6, 0x100000000, 0x7, 0x0, 0x8, 0x0, 0x17d5c0, 0x55f, 0x7, 0x8000, 0x4, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000002c0), 0x6}, 0x22104, 0x0, 0x80, 0xf, 0x0, 0x800, 0xffffffff80000000}, r2, 0x0, r0, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r1, 0x200, 0x8}, 0xc) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18, 0xd, 0x1, {{0x2, 0x2, 0x3}, 0x38}}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r3, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) setsockopt$sock_cred(r3, 0x1, 0x11, 0xfffffffffffffffe, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x5) 03:41:14 executing program 2: 03:41:14 executing program 4: 03:41:14 executing program 1: 03:41:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:14 executing program 3: 03:41:14 executing program 2: 03:41:14 executing program 3: 03:41:14 executing program 4: 03:41:14 executing program 1: 03:41:15 executing program 2: 03:41:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='attr/sockcreate\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 2180.423116] kauditd_printk_skb: 27 callbacks suppressed [ 2180.423125] audit: type=1400 audit(2000000475.620:62134): avc: denied { map } for pid=12621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.451263] audit: type=1400 audit(2000000475.620:62135): avc: denied { map } for pid=12621 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.477189] audit: type=1400 audit(2000000475.620:62136): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.501427] audit: type=1400 audit(2000000475.620:62137): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.528152] audit: type=1400 audit(2000000475.620:62138): avc: denied { map } for pid=12621 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.550877] audit: type=1400 audit(2000000475.620:62139): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3199c070") writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 03:41:15 executing program 0: r0 = inotify_init1(0x20807f9) fsetxattr$security_ima(r0, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@ng={0x4, 0x2, "3cf67d35d7642fa0142d1b7a"}, 0xe, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000340)="1d46123a7f82e269ecfeec012df8e0f27f4000465b3506ebf585dfd2e446d1462aa6809946b0af3db1a945e6c93d8d5402d351d3713527a7fe64e08889000ce29de9d2e792431aa3f923d9613877019fa36aa0adb0a7b82e08efba96", 0x5c, r0}, 0x68) recvfrom$inet6(r1, &(0x7f0000000040)=""/211, 0xd3, 0x40000000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}, 0x800}, 0x1c) inotify_init1(0x80800) 03:41:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:41:15 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a52e) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000240)='ip6gretap0\x00', 0x10) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x8000000006, 0x0, 0x0, 0xb92}]}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 2180.579290] audit: type=1400 audit(2000000475.620:62140): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2180.604008] audit: type=1400 audit(2000000475.620:62141): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:15 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xc, 0x0, 0x0) [ 2180.677763] audit: type=1400 audit(2000000475.650:62142): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x10080002000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2, 0x4, 0x1, 0x10000, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x802, 0xc1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x60b, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x890) pipe2(&(0x7f0000000000), 0x4000) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2180.784900] audit: type=1400 audit(2000000475.650:62143): avc: denied { map } for pid=12621 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 3: syz_emit_ethernet(0x4, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32], @ANYPTR=&(0x7f0000000100)=ANY=[], @ANYRESDEC, @ANYBLOB="3ae01d6f667a0b9622b5ffa488b3cde17aa8f26695273902b19b8fc726930843dd53d9aa9c5446a4fb0d1c29dd4c811fb65d01743e359d1c04c2a682b61a9bbf9818ab42685dd91b10b95bfd56d327c7184a26647c09d75c687a526eb660bdb2d121a1d77a39be3db4c2483121f0fabfd1619c18850471ba81b20806c60687891832127da9a02be67c2a9b352ea38ad5b624cbed82d426fe459a792212a25fb80327ed47bc327af31fb5fb3b94570b5fc951484dc821d0b13c3c1d6f3dd1155be8188b61c815195e1f"], 0x0) 03:41:16 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xe9cc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x1, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000040)=""/9) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:16 executing program 3: syz_emit_ethernet(0x5ba, &(0x7f00000001c0)={@random="e5c1a2e67983", @remote, [], {@ipv6={0x86dd, {0x4, 0x6, "116c59", 0x584, 0x2b, 0x1, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@hopopts, @hopopts={0x7f, 0x1, [], [@jumbo={0xc2, 0x4, 0x3f}, @enc_lim={0x4, 0x1, 0x37}]}], @icmpv6=@param_prob={0x4, 0x2, 0x0, 0x2, {0x88, 0x6, "3106d1", 0x200, 0x3f, 0xf6e, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, [@routing={0x0, 0x2, 0x2, 0xbd4, 0x0, [@empty]}, @routing={0x88, 0x6, 0x1, 0x100, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty]}, @routing={0x73, 0x4, 0x2, 0x5, 0x0, [@remote, @ipv4={[], [], @multicast2}]}, @dstopts={0x7e, 0xa, [], [@calipso={0x7, 0x38, {0x3f, 0xc, 0x7, 0x10000, [0x3ff, 0x4, 0xfffffffffffffffc, 0x101, 0x6, 0x27cd1da7]}}, @enc_lim={0x4, 0x1, 0x2}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xace9}, @pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @dstopts={0x3f, 0x4, [], [@pad1, @enc_lim={0x4, 0x1, 0xfffffffffffffff8}, @calipso={0x7, 0x18, {0x1000, 0x4, 0xb047, 0xc256, [0x7fffffff, 0x80000001]}}, @enc_lim={0x4, 0x1, 0x3f}]}, @dstopts={0x2, 0x2d, [], [@calipso={0x7, 0x58, {0x9, 0x14, 0x100000000, 0xfffffffffffffffc, [0x0, 0x7fffffff, 0xffffffff, 0xae4, 0x401, 0xf33d, 0x9, 0x8000, 0x20, 0x4]}}, @jumbo={0xc2, 0x4, 0x2}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xff}, @jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x10, {0x1, 0x2, 0x1, 0x5, [0x9]}}, @generic={0x80, 0xb5, "9100ea0cae73a3c5e012012ece8825ac625272af28f66fe4aa206b94cb08cb1bf8c6aa9993ae1fd4796d43a02483b7661fce8491e5baabd3e6ab5ff5ee0051556bd16852e457b446a581c16e1e7f1991d310f1df053a1e6a6937820c611962a59005b53af1014e26e5c08b30d76a804646867cac35f6a82a9d5de212b2b5567c334347690ae6305c5547349d8fe671f488c43338e24c5ea2c04c955b630f2f5ab4a715c1b2d0ab7da48360db5af043d81228b2a414"}, @pad1, @pad1, @calipso={0x7, 0x30, {0x8, 0xa, 0x800, 0xfffffffffffffffd, [0xfffffffffffffff8, 0x76, 0x8, 0x401, 0x2]}}]}, @dstopts={0x2f, 0x0, [], [@enc_lim={0x4, 0x1, 0x8860}]}, @hopopts={0x1d, 0x1e, [], [@generic={0x8001, 0xc8, "788e9962b0398492db6fe5863d29aab1de9fee989ee56621d519079256bf50d351b3ebeb0895ea7379e3e6e58792bf2f2befd6b86d05b51cc8fa60feb18ec542400f6c894792cf88097c04ea99594729d7ec0ac97c37f766a5a5fcd610d58d2ca9bb5017f8542a12de3ae47d8666c290764623d25dd23c638957083b6ebc570d242fa13d93cd342630bea5c90e3d09db8d6b6215fcbf98888a307ca9823c2d9acbea2c35164bedeb44db7fe68ded5663f8f2805b44fa7dcd527d7392b5424217b602c564c1f606ea"}, @ra={0x5, 0x2, 0x101}, @pad1, @pad1, @ra={0x5, 0x2, 0x1ff}, @enc_lim={0x4, 0x1, 0x4}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @ra={0x5, 0x2, 0x7}, @pad1]}, @hopopts={0x7f, 0x12, [], [@ra={0x5, 0x2, 0x1}, @enc_lim, @generic={0x3ff, 0x8e, "71768ee7df60060b0ef5d80736204af9d4079dd01d191356e7c661ac5b48d8adff9677198ad79f61e9fdcca7e1e497e8d92dd05b4e6935614b0c962289cb8af87c5482128215b79cdfbc7f6fb34a88a5dd94fcbad8d61777efdbbc47b8a72aa499fa398efb2d003fefc40ebcfea679498e31dd893cf1bc660bf210dcf79aa85ff273bd2cf2b332234d78070cdc1d"}]}, @srh={0x3b, 0x4, 0x4, 0x2, 0x3f, 0x8, 0x5, [@empty, @mcast1]}], "0c3a506957547b5e8c48a750fcf3fea8ba4d4648a4b31208a3691fc3885d3c7f7299b79f3187f8f2e76d2e54dc2c4c0b3c193953bf3146877855382a92b3b5721ba1ba9eb09b86066f399f7ae35626b039b895de3aefbfa59f928a338ab9268090145adbc2b673eadd5d60fce59360883204041fa0c486530c7afdb6b0cd381630379ca3598d6fc6e225d4a10f2ec295c6b25a39f420dd00c68cc55cd0b25307ef1efe2b5c558a7e2fd4f144cd10abe5c5f0207198ef553988b1508f739ca87075fcdd11b0d64f4afdeaf56c4cec7ae735952a633df2a2e42d0b08be"}}}}}}}, 0x0) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0xfffffffffffffff7, 0x4, 0x1, 0x6, 0x1f00}) 03:41:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:16 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ipddp0\x00', 0x400}) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:16 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf4, r1, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x419}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4bab}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000040}, 0x80) syz_emit_ethernet(0xffffffffffffff9d, &(0x7f00000000c0)={@random="e5c1a2e67983", @remote, [], {@llc={0x4, {@llc={0xff, 0x80, "d6", "11c6b7f3fe38664b512850edf0bb198429e202c0552eff7abef3d4606562479239f8e4f20b38c74217d1058d8aa9d2fbbb4e775fc02ce8b8ff7a123fcdddcfef2cc10125770ae2478f6108fbb1c1def0aef009b483d2f67ce0ea88668ea5e28c1a6c945c900272d6d682f534356230b762515be1d4a2e98d7f8a41861a4477d38c2e63"}}}}}, 0x0) 03:41:17 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x70, 0x7fff, 0x7, 0xfaa5, 0x2, 0x0, 0x80000000, 0x400, 0xf, 0xd20b, 0x169, 0xcde0, 0x8, 0x1, 0xef92, 0x100000000, 0x80000001, 0x3, 0x6227d227, 0x1, 0x100, 0x3c5f, 0x6, 0x2, 0xfffffffffffffff7, 0x5, 0xd482, 0x2, 0x7fffffff, 0x400, 0x6a9, 0x100000001, 0x1, 0x2, 0x94, 0x10000, 0x101, 0x0, 0x0, 0x2, @perf_config_ext={0x100, 0x6}, 0x8000, 0xff0000000000000, 0x7, 0x6, 0x1, 0x897, 0x2}, r0, 0xe, r0, 0x8) 03:41:17 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:17 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0xe9cc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x1, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000040)=""/9) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:17 executing program 1: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="dd2968d1dc70be557d672b4bb402fecb74b0231b9031e761f1aefa582a7bd97a17f45d9e6cbb810bb05e94032b3571e234454831291994c60866ecd8790e26ff886821e31941f4862412380f4c54e51118a44eb24b23894ddc7fa6936ba484d9713e0831263e91b82c6673116e5640d7b4b0c1aaf992a0c5d6afe457b2d807c9b98890995bf629fc154c7eb2ce0c2e2814c8fa166f1f4522af355b62ca7103f01abfec7281f52055afe90f40a2c782c7cacae980454953c0f871b7ae4830ff2246aff13ba514b8edbf849967f883fc0219c81985cb53", 0xd6, 0xfffffffffffffff9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000380)=')ppp0ppp1&md5sumkeyringsecurityselinux(self\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x20, r1, 0x0, 0xffffffffffffff00) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000340)) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000300)={r0, 0x3, 0x5dcc}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d7f20686173683d736861323234090000000000000000000000000000000000000000000000000000230000000000f56326120aa1dec33b2dcb552026c1b30000000000009eca918cbc9b8f6a65abe3fdfcc96d617bc35e70943ce3b167eab26e96f9cbdf803f3d190c286543f2e32662b9ff721eb9ff1f3f8c8adc53c593000000"], &(0x7f00000003c0)="46d42fe50754cde3ce8abc127878651ced639626306c6e9c167fce371c95957333b8f6b7a4bce06ba0fd5f928ab6bf2c8b12074aa6abee0d11d79511138949fa2c42164c1bd9734824e82453f84e36c160f925e26f7cdd1d363d9568b21c06fcf9e82201606381b71441d6d955f91f14dfc018f31e1e06dcd3d36aee78788afc8cd47ec0003df60668dbda849a467d915259b95a782a9d27e6df42eac9e897cb91ceeeb1abafea23d249a084ebe091df082ba1915078ee19fa1a0ae80a80ec8252", &(0x7f0000000500)="7c2c6226a2ee667e38eb2d02ec0c35523188ac93d434446fa515d69d137cfa") syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) 03:41:17 executing program 3: syz_emit_ethernet(0xcc, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:41:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:17 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x81, 0x5}) 03:41:17 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='%em0sy\t\x00\x00\x00\x00\x00\x00\x00truspewlan1\x00\x80\x1f.g\x92}\xc6\x10\xbd\xc0\xec n\x9d0\x13\x8b5\xa4\xb7\xf5\xf4\x86\xbe\xff\"\x1c\x1a0\x13j\xbb\x99\xa6\xe6\xf3c\xff\x1c\xcd,\xd2\x00L\xcc\x9d\x90\x9bHl\x8b\xcc\xa3X\x87\x17\xe8\x1f\x9d\xc6\x92c\b\x8cm\xb3%\xb3U\xd5+\a\xd4\xc4\x05\x9d\xdf\fY\xb8\xf2\x1c\xa8A9K') fstat(r0, &(0x7f0000000140)) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) syz_emit_ethernet(0x32, &(0x7f0000000100)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0x38d, 0x1, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:17 executing program 4: clone(0x8024003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, &(0x7f0000000280)) r1 = gettid() wait4(r1, 0x0, 0x7ffffffd, 0x0) ptrace$setopts(0x4206, r1, 0x3, 0xfffffffffffffffc) tkill(r1, 0x32) ptrace$cont(0x18, r1, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000001400)='fdinfo\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x424000, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x1015, 0x0, 0x0, "6e69ceda42becabc52e92cac7f8a2b1b", "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"}, 0x1015, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r3 = accept4(r2, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x800) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000001c0)={'IDLETIMER\x00'}, &(0x7f0000000200)=0x1e) sched_getaffinity(r1, 0x8, &(0x7f0000001440)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r1, 0xfff, &(0x7f0000000140)="38218716e4f7b491c386bdb02b118b4a8b55e5b0f4a74380372e3b365af68434fc8d69398d5b378fefe0271207d7f6e2db4cdd7debed9b540a35053e0548cae96d81345509080f63d31c7b18f54bdf21da5a3184d5616f72685252112e0ae7d388e00436fe77a40c56a373846732d357b5daa8ab0701") ptrace$cont(0x9, r1, 0x0, 0x0) 03:41:18 executing program 3: clone(0x9000000, &(0x7f0000000040)="8a3b17783457ce99c07374cf0d42841e5ae44fd5d29137657ca68d15fea11f30f2d7f53cf930c799139b12e116b4bd9e38d58717c05685cd26b0e627bc47ea3127e4f2822dd0656d10f81a67a3", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000001c0)="0863f7853a647bc7d256a60b61b582d7f4999deb23c7dec8a3da79fa11f91fd5137a5e4bc7e13258bb596b902a5738dadde76e72292efa42bd3a4111c7853d48cdc0fbfdba5204ffbda72ac1ecc7b7af1f0216") pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80010, r0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:18 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x8fd, 0x7, 0x7, 0x8, 0x200, r0}) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:18 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001100)=@security={'security\x00', 0xe, 0x4, 0x478, 0x148, 0x148, 0x148, 0x0, 0x0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x4, &(0x7f00000001c0), {[{{@ip={@dev={0xac, 0x14, 0x14, 0xd}, @multicast2, 0xffffffff, 0xff, 'bcsf0\x00', 'syz_tun\x00', {0xff}, {}, 0x0, 0x0, 0x1}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@inet=@multiport={0x50, 'multiport\x00', 0x1, {0x2, 0x2, [0x4e22, 0x4e20, 0x4e20, 0x4e23, 0x4e24, 0x4e24, 0x4e20, 0x4e22, 0x4e23, 0x4e20, 0x4e20, 0x4e23, 0x4e20, 0x4e20, 0x4e21], [0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1], 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x2, 0x101, 0x3f, 0x1, 0x5, 0xc6a], 0x9, 0xba}, {0xfff, [0x3f, 0x7fff, 0x5, 0x3f, 0x80000000, 0x1e61], 0x3, 0x7}}}}, {{@uncond, 0x0, 0x110, 0x170, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x9}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x0, 0x1, 0x1, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x10000, 0x7, [0x18, 0x3, 0x0, 0x15, 0x32, 0x2, 0x20, 0x23, 0x1f, 0x3d, 0x1, 0x34, 0x8, 0x21, 0x1c, 0x16], 0x1, 0xfff, 0x4}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@unspec=@mark={0x30, 'mark\x00', 0x1, {0xffffffffffff8000, 0x80000000}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x7, 0x4, 0xf5, 0xfffffffffffffff7, 0x3, 0x1000], 0x5, 0x8}, {0xffffffffffffffe1, [0x6, 0xfffffffffffffc47, 0x51, 0x3, 0x4, 0x8], 0x9, 0x6a61}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) fcntl$addseals(r0, 0x409, 0x4) 03:41:18 executing program 0: r0 = inotify_init1(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f00000000c0), 0xe76, 0x0) 03:41:18 executing program 3: syz_emit_ethernet(0x5a, &(0x7f00000003c0)={@local, @local, [{[], {0x8100, 0x10000, 0x100, 0x1}}], {@canfd={0xd, {{0x0, 0x3, 0x200, 0xfffffffffffff001}, 0x20, 0x1, 0x0, 0x0, "b85c006ff5d902b1e9f371545f3efef8853d5d57c0bb66c983c09d5801dd0a1a7c4571859acb6a6a5e2caa1def97bf08a0077cdae66172c8da74b26ed2c890ed"}}}}, 0x0) 03:41:20 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x2) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000180)='./file0\x00', 0x100, 0x113) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x8, 0xffffffff, 0x1, 0x5, 0x0, 0x7ff, 0x4000, 0x0, 0x4, 0x9, 0xfa, 0xffffffff, 0x1f, 0x400, 0x7, 0x0, 0x4, 0x81, 0x1, 0xf3, 0x400, 0x0, 0x2, 0x80000000, 0xfffffffffffffff7, 0x9, 0x5, 0x9, 0x4, 0x23, 0x800, 0x56, 0x5, 0x8, 0x0, 0x80000001, 0x0, 0x4, 0x5, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x300000, 0x0, 0x6, 0x3, 0x5, 0x81}, 0xffffffffffffffff, 0x5, r2, 0x8) r3 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x3, &(0x7f0000000200)=""/233) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) getpeername(0xffffffffffffffff, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8004}, 0x4000000) write$P9_RXATTRWALK(r2, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0xfffffffffffffff9}, 0xf) 03:41:20 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x8001}, 0x28, 0x3) syz_emit_ethernet(0x167, &(0x7f0000000300)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb81000c00080045000155000000000002907800000000e0000001110090780000000000e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c68af3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566085e043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"], 0x0) 03:41:20 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8880, 0x0) finit_module(r1, &(0x7f0000000040)=']]\x00', 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 03:41:20 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000aaaaaaaaaa1a0806000186dd06100007000000000000fe880000000000000000000000000001ffffffffffff00000000000000000000000000000001bb3a6995b1cc6d33a24c1d9f140f5624a7576d2b5db2c22cd9eac458cd128a60ac55f955ae23fb907a55c3decc494ec0af6e53b83dea46229fdf96671a64f87c"], 0x0) 03:41:20 executing program 0: r0 = inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x2, {0x4, 0x0, 0x8}}, 0x14) getpeername$inet6(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) fcntl$dupfd(r1, 0x406, r0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x1, 0x0) 03:41:20 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000300)={{0x0, 0x1, 0x5, 0xc9eba785885a7a71, 0x4}, 0x9, 0x5, 0x8001}) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet_udp_int(r1, 0x11, 0x61, &(0x7f0000000100)=0x8000, 0xfffffffffffffd4a) 03:41:20 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb08004500002000000000000290780000000ce0000001110090780000000000e000085b4abcd8b336324d77c6358ee7fda131c52c0e4e"], 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, r0, r1) 03:41:20 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x311082, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000404}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_getnetconf={0x1c, 0x52, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2185.798519] kauditd_printk_skb: 70 callbacks suppressed [ 2185.798529] audit: type=1400 audit(2000000480.990:62214): avc: denied { create } for pid=12742 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:21 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:21 executing program 1: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8000, 0x39d1, 0x1f, 0x5e, 0x8, 0x10000, 0x7, 0x8000}, &(0x7f0000000100)={0x7, 0x8, 0x9, 0x9, 0x400, 0x7f, 0x7fff, 0x8c}, &(0x7f0000000140)={0x0, 0x80, 0x2, 0xffffffff80000001, 0x8000, 0x0, 0xfd33, 0xe9b}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={0x5}, 0x8}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+10000}, {0x0, 0x2710}}) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) [ 2185.918747] audit: type=1400 audit(2000000481.010:62215): avc: denied { write } for pid=12742 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:21 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaaca0800450000912000000000000000e732a3092d9bb4ba8399319d0000e0000800000000000000000000000000000d044a463900"], 0x0) [ 2186.028566] audit: type=1400 audit(2000000481.160:62216): avc: denied { map } for pid=12747 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.106090] audit: type=1400 audit(2000000481.160:62217): avc: denied { map } for pid=12747 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.182956] audit: type=1400 audit(2000000481.180:62218): avc: denied { map } for pid=12747 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:21 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3) fsetxattr$security_selinux(r0, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:memory_device_t:s0\x00', 0x25, 0x3) 03:41:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) [ 2186.310135] audit: type=1400 audit(2000000481.190:62219): avc: denied { map } for pid=12747 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:21 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000340)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb81001400080045000020000000000002907800000000e0000001110090780000000000e0000839db32e41f2994c7591740c15fdd7286f07ebf77ed6c520476cb9bf5791ee269e2dad36ce8507ee46e9480b093e12bde6ad3f9b6c4fa1c3995d589cd1f9f7ee392462a39c0a21222afc6d13e478656277d0bdf84a72bd8f9709b11702a29c17e45348e7d2e337967aaa1238e136af2ecc695dc8840f981acbcc26e45bf141bccaf79e79d47c6fe9b753bb8d34e8041e28e182bc79ef32cdf28dab04db834a052af815f1880479ce21ed8119de017a2"], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/l2cap\x00') r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x2, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}}, 0x20000000) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) [ 2186.390160] audit: type=1400 audit(2000000481.220:62220): avc: denied { map } for pid=12747 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) [ 2186.459443] audit: type=1400 audit(2000000481.220:62221): avc: denied { map } for pid=12747 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2186.539382] audit: type=1400 audit(2000000481.220:62222): avc: denied { map } for pid=12747 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:21 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000040)={@rand_addr, @initdev}, &(0x7f0000000080)=0x28e) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) [ 2186.635886] audit: type=1400 audit(2000000481.280:62223): avc: denied { map } for pid=12747 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:22 executing program 0: r0 = inotify_init1(0x2000000ffffffff8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) r1 = dup(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="efe1194c82b0de32ebf6466d5ecd170a", 0x10) r2 = getpgid(0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xfffffffffffffffb, 0x40000) r3 = syz_open_procfs(r2, &(0x7f0000000180)='\xa3\xd36/\x18\xd2\xf1\xf9\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x0, 0x0) 03:41:22 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000080)=0xfffffffffffffd95) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:22 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x12000, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80004001fd) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0xbf, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e20, 0x3, 'nq\x00', 0x10, 0x1, 0x46}, 0x2c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:22 executing program 1: syz_emit_ethernet(0xffffff8e, &(0x7f0000000000)={@dev={[], 0x28}, @remote, [{[], {0x8100, 0x20, 0x9, 0x4}}], {@llc={0x4, {@snap={0x1, 0x0, "cc35", "f1807f", 0x86dd, "e45ac01a8112176fe74d4d8d409ff2bc96842f9877495e9f4cc628bf23f92d5cda5db53a845a5bb3c8ed176fd13fe0b6fd6460ee83d410a94d1f6db031bc5103b9af3098e0eba5957d93"}}}}}, 0x0) 03:41:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x19) mmap(&(0x7f000002a000/0x12000)=nil, 0x12000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(r0, &(0x7f00000004c0)=""/203, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000026000)='./file0\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getdents64(r2, &(0x7f0000029fd4)=""/48, 0x30) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaa3d996e38bdc758aaaabb080045000020000000000002907800000000e0000001110090780000000000e000081f40eadf6669368e133846aeadc69264533cce2956233e102a245d4ec44e532d61c082163f665050f271840fc38ddb98be865e6d3fb056626a155ae42b470dbba11b99678c786c8a27d2e5221ff72d9fc39fc1c7cb2aad6dc5bb855c38bc42c931f5aa3be3183905b29996abe30f7731f0cd3da6b705d7d179697e81adf69a"], 0x0) dup2(r1, r2) 03:41:22 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r1, &(0x7f0000000000)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x100, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) syslog(0x9, &(0x7f0000000140)=""/100, 0x2d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:22 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KIOCSOUND(r0, 0x4b2f, 0x5) 03:41:22 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/39, 0x27}, {&(0x7f0000000300)=""/233, 0xe9}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000100)=""/49, 0x31}, {&(0x7f0000000400)=""/118, 0x76}, {&(0x7f0000000480)=""/193, 0xc1}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x7, &(0x7f0000001600)=""/137, 0x89}, 0x10040) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000016c0)={'filter\x00'}, &(0x7f0000001740)=0x78) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:41:22 executing program 3: syz_extract_tcp_res(&(0x7f0000000140)={0x41424344, 0x41424344}, 0x2, 0xb64a) syz_extract_tcp_res(&(0x7f00000001c0)={0x41424344}, 0x2, 0x7) syz_emit_ethernet(0x194, &(0x7f0000000200)={@random="e5c1a2e67983", @random="39297d024785", [{[{0x9100, 0x100000001, 0xfffffffffffffffe, 0x3}], {0x8100, 0x3, 0x1ff, 0x3}}], {@mpls_uc={0x8847, {[{0x800, 0x1, 0x6, 0x3bd95067}], @ipv4={{0x11, 0x4, 0x9, 0x3f, 0x17a, 0x65, 0x1000, 0x100000000, 0xe, 0x0, @broadcast, @empty, {[@generic={0x89, 0x6, "015a26c6"}, @ssrr={0x89, 0x27, 0x2, [@loopback, @multicast2, @dev={0xac, 0x14, 0x14, 0x29}, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @empty, @local, @dev={0xac, 0x14, 0x14, 0x1c}]}, @end]}}, @tcp={{0x4e24, 0x4e20, r0, r1, 0x2, 0x0, 0x16, 0x8, 0x3dd, 0x0, 0x7f, {[@mss={0x2, 0x4, 0x8}, @window={0x3, 0x3}, @generic={0x22, 0x4, "8632"}, @sack_perm={0x4, 0x2}, @sack={0x5, 0x1e, [0x80000001, 0xfffffffffffffffe, 0x100, 0xf4, 0x80, 0x9d, 0x5]}, @generic={0x2, 0xb, "bb6a004ae9162f2e03"}, @sack={0x5, 0xa, [0x1, 0x0]}, @nop]}}, {"a30d884947587aebfd45a46a54f55884380365e2ce94e7ada2f1250a4cfdeb77403c0f6428bd456c60005cfa47ee06fa952cb80a5cde72f4d8594e6c065df6628750bd08d38aaf51c00386ad4ffe54f5929c75868377bf57e197be28f4e9a82382e990d276060cbeedc51ba43ecbc25e06661f7b86e8ebfbc160729405e939626c63492eee02d1239b606239cbf4a97320204b19d7a9437c80574183883351971ffd732b9f3e2f7eb67d2719f3dec2ea183f353d81a0735211184497fa57050f6c861d522ee398018a616e21a6b7c372043ea24b82693e25560e980d1a4e"}}}}}}}, 0x0) 03:41:22 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x1, @mcast2, 0x8d87}, {0xa, 0x4e23, 0x4, @remote, 0xffffffffffffffc0}, 0x4, [0x2, 0x35, 0x100, 0x9, 0x200, 0x3, 0x7, 0x1]}, 0x5c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x191) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:25 executing program 1: clock_adjtime(0x7, &(0x7f0000000000)={0x0, 0x7, 0x800, 0x3f, 0x0, 0x4, 0x6, 0x80000000, 0xb0, 0x4, 0x9d58ef0, 0x5, 0x0, 0x9, 0x0, 0x4, 0x5, 0x81, 0x6, 0x4, 0x1d7, 0x4a, 0x3f, 0x80, 0x71d, 0xfff}) syz_emit_ethernet(0x163, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400000, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000280)) 03:41:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 03:41:25 executing program 0: inotify_init1(0x80800) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r1, 0x100, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x20, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x40884) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/246, 0xf6}], 0x10000000000000e2, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'lapb0\x00', 0x10}) ioctl$TIOCEXCL(r2, 0x540c) 03:41:25 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb090045000020000000000002907800200000e0000001110090780000000000e00008"], 0x0) 03:41:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_RELDISP(r1, 0x5605) getsockname(r0, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:25 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) sched_setattr(r0, &(0x7f0000000200)={0x30, 0x6, 0x0, 0x2, 0xffffffff7fffffff, 0x5000000, 0x7, 0xa164}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x41) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x300, 0x70bd25, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x4000050) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r0) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r2 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x8, 0x40) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0xa6c) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() r7 = getegid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x4}, [], {0x4, 0x7}, [{0x8, 0x4, r3}, {0x8, 0x1, r4}, {0x8, 0x0, r5}, {0x8, 0x2, r6}, {0x8, 0x0, r7}], {0x10, 0x6}, {0x20, 0x1}}, 0x4c, 0x2) 03:41:25 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x480, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x7) statx(r0, &(0x7f0000000040)='./file0\x00', 0x6000, 0x82, &(0x7f0000000080)) 03:41:25 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) 03:41:25 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYPTR64, @ANYBLOB="5bcacd33a385e74d39ec11b94d22f449427c776d2b8df1de262444eaf263cec72027e963762b530a6c491359612929d36199b8a60ab752304928971e12a0259456ae8b23b48701c0a9513425b1935fb6794e5926c237e2f0b0e7d0d4a52c9b2b1610585023c327e3f99678f7b73f63c0ada6c5e37b44d8c72b", @ANYRESHEX, @ANYRES16=0x0], @ANYBLOB="2716c3872f9ce4940949b9d407e99dc875a60e9ece6dd0d05d7b2d4aca1b8534f8b7e33047f06cdbaad89509568720d8fe94dbaff989f21b7d8b53ae15b6a5e9899bedbf605cf00fa3", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES64=0x0, @ANYBLOB="4cbb5d7471089ef1f80571b2751fa5c5be6a81767fdc8d0efd120eb06604900fd356c99d3de528124db007058589d263777ff77a130ad1df02d09886537b34e68e02de576ff135babdb47d90b6af2492844447edaabccd1abc151c8188327c60216da7ce3086cac3200864128bdddf9ae99ba5c0ef24e94c4128993a0b797f0132cce3da88", @ANYRES64, @ANYRES16], @ANYRESHEX=0x0, @ANYRESHEX, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRES32]], 0x0) prctl$PR_GET_SECCOMP(0x15) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x800, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000340)=0x1e) 03:41:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0xf909, 0x78b04d05, 0x7ff, 0x2}) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x800, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000100)) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 03:41:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x82) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) clock_gettime(0x0, &(0x7f0000004e40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004c80)=[{{&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000000100)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/214, 0xd6}, {&(0x7f0000001400)=""/230, 0xe6}, {&(0x7f00000000c0)=""/64, 0x40}], 0x4}, 0x9}, {{&(0x7f0000001500)=@ax25={{0x3, @bcast}, [@null, @default, @null, @remote, @remote, @netrom, @null, @null]}, 0x80, &(0x7f0000000140)=[{&(0x7f0000001580)=""/245, 0xf5}], 0x1, &(0x7f0000001680)=""/143, 0x8f}, 0x8}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f0000001740)=""/27, 0x1b}, {&(0x7f0000001780)=""/187, 0xbb}, {&(0x7f0000001840)=""/143, 0x8f}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/197, 0xc5}], 0x5, &(0x7f0000002a80)=""/20, 0x14}}, {{&(0x7f0000002ac0)=@rc, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002b40)=""/204, 0xcc}, {&(0x7f0000002c40)=""/71, 0x47}], 0x2, &(0x7f0000002d00)=""/101, 0x65}, 0x5}, {{&(0x7f0000002d80)=@can, 0x80, &(0x7f0000004340)=[{&(0x7f0000002e00)=""/204, 0xcc}, {&(0x7f0000002f00)=""/62, 0x3e}, {&(0x7f0000002f40)=""/35, 0x23}, {&(0x7f0000002f80)=""/240, 0xf0}, {&(0x7f0000003080)=""/131, 0x83}, {&(0x7f0000003140)=""/52, 0x34}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/187, 0xbb}, {&(0x7f0000004240)=""/193, 0xc1}], 0x9, &(0x7f0000004400)=""/5, 0x5}, 0x400}, {{&(0x7f0000004440)=@rc, 0x80, &(0x7f0000004540)=[{&(0x7f00000044c0)=""/125, 0x7d}], 0x1, &(0x7f0000004580)=""/159, 0x9f}, 0x3}, {{&(0x7f0000004640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000004b80)=[{&(0x7f00000046c0)=""/206, 0xce}, {&(0x7f00000047c0)=""/105, 0x69}, {&(0x7f0000004840)=""/220, 0xdc}, {&(0x7f0000004940)=""/213, 0xd5}, {&(0x7f0000004a40)=""/67, 0x43}, {&(0x7f0000004ac0)=""/181, 0xb5}], 0x6, &(0x7f0000004c00)=""/71, 0x47}, 0x5}], 0x7, 0x20, &(0x7f0000004e80)={r1, r2+10000000}) 03:41:25 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0x7, 0x400}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) [ 2190.914641] kauditd_printk_skb: 83 callbacks suppressed [ 2190.914651] audit: type=1400 audit(2000000486.110:62307): avc: denied { create } for pid=12828 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2190.972077] audit: type=1400 audit(2000000486.110:62308): avc: denied { write } for pid=12828 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2191.007117] audit: type=1400 audit(2000000486.120:62309): avc: denied { map } for pid=12867 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.029476] audit: type=1400 audit(2000000486.120:62310): avc: denied { map } for pid=12867 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.054451] audit: type=1400 audit(2000000486.120:62311): avc: denied { map } for pid=12867 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.078818] audit: type=1400 audit(2000000486.120:62312): avc: denied { map } for pid=12867 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.105150] audit: type=1400 audit(2000000486.150:62313): avc: denied { map } for pid=12867 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.128226] audit: type=1400 audit(2000000486.150:62314): avc: denied { map } for pid=12867 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.160097] audit: type=1400 audit(2000000486.150:62315): avc: denied { map } for pid=12867 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2191.184839] audit: type=1400 audit(2000000486.160:62316): avc: denied { map } for pid=12867 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) 03:41:28 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@rand_addr="75df6d667ddad794444e8d13e3b28326", @in=@rand_addr=0x6, 0x4e24, 0x2, 0x4e20, 0x2, 0xa, 0x80, 0x80, 0x2a4b7d720619c3c8, r2, r3}, {0x1, 0x81, 0x6, 0x200, 0x0, 0x4, 0x8, 0x2a}, {0x401, 0x92, 0x8, 0x4}, 0x1, 0x6e6bb0, 0x1, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x9, 0x4d2, 0x3e}, 0x2, @in6=@rand_addr="0b56a2fca9dc7dc9fb12c2a0fbd9a1c5", 0x3503, 0x3, 0x1, 0x6, 0xf893, 0x5, 0x3eb4e4c3}}, 0xe8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.SMACK64\x00', &(0x7f0000000380)='wlan0\'\x00', 0x7, 0x2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:28 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='(\\((eth1!selinuxmd5sumposix_acl_accessppp0vmnet1^\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r0, 0x3ff, 0x7fff}, &(0x7f0000000100)={'enc=', 'raw', ' hash=', {'sha256-arm64\x00'}}, &(0x7f00000001c0)="93d1db97b7e6d381ce3532b7b3cfa62b98d0097d76f79783e20a864af2077b9a2253c2fb4de0017c4ca519a55eedb48643e55890c3d891a28ab125a61d73ec771d156018890af964316c43dc469569025719eef959ba394befb77fe4ad8087446591bb7fefd824cac6d60bfdd0a873d40c4159c7f8bf118a8ed6d88deac3a9b658e34fba02931fa5e5b3b71de07fda7c04316eaf71ec32e285b2d6a1f274f04581a83e1680ab83bb56b3a77ffdcac25dc3cdbf2d7a20c03739e555c13755d95f67333a363352303e0721", &(0x7f00000002c0)="f5ae359403eee03dce2b3832234fc0ebb3160d0d338c8fd71194537fcbd35528276e3581771447ffaa548a5e46209ef53c4bb05469a5d4280d3da8403713f08fc17990bcaf4e66ea66fc8927b8becea5722f031ca77488ce0a33cc78d3b464d87a302f206e0f206fbfe9a06d44ab8b57d30d594b0250da0643b41eb088c4335783777c86f06c29b5c7f022777f1c4be1cb1e3c65ce98e6746dc40b2af287176b01fcbc2b") 03:41:28 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x21, 0x36, 0xf, 0x16, 0x4, 0x9, 0x0, 0x168}) 03:41:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x44000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000180)) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:41:28 executing program 0: inotify_init1(0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) waitid(0x0, r1, &(0x7f0000000200), 0x1000000, &(0x7f0000000a40)) write(r0, &(0x7f0000000280)="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", 0xfc) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0xc0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), 0x0, r2}, 0x68) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x31d4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_GET_TSC(0x19, &(0x7f0000000580)) setxattr$security_capability(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x3, 0x2}, {0x0, 0x8}]}, 0x18, 0x1) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r3 = socket(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000540)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000700)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000980)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x30, r5, 0x0, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x2, 0x1}}}, [""]}, 0x30}}, 0x40000) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) removexattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)=@known='trusted.overlay.origin\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000003c0)={'hwsim0\x00', {0x2, 0x4e24, @broadcast}}) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffcbc) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000840)) 03:41:28 executing program 3: syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0xffffffff, 0x0) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344}, 0x5, 0x1) syz_emit_ethernet(0x12e3, &(0x7f00000001c0)={@random="e5c1a2e67983", @remote, [], {@ipv6={0x86dd, {0xfffffffffffffffe, 0x6, "9185a0", 0x12ad, 0x33, 0x81, @local, @mcast2, {[@srh={0x7f, 0x12, 0x4, 0x9, 0x8767, 0x10, 0x6, [@loopback, @loopback, @remote, @local, @empty, @rand_addr="14aab2bfcd9863b077e487aeab4fa3c5", @empty, @empty, @ipv4={[], [], @loopback}]}, @fragment={0x67, 0x0, 0x4, 0x0, 0x0, 0x1f, 0x66}, @dstopts={0xbf, 0x27, [], [@pad1, @ra={0x5, 0x2, 0x120000000}, @calipso={0x7, 0x28, {0x3f, 0x8, 0x8001, 0x1, [0x900, 0x8, 0x4, 0xffffffffffffffc1]}}, @generic={0x380000000, 0xc6, "b01638eb352a27ed3d05a12bd6e6ec406faade97fbc95456b78f16bb9b54479554c1276213340b3cd6b45d4e0b4e628823108848be57a936cf1a88f7b60c6f4c0fde0bf0a716b13c7a1fe69c1e0fedefe17bd9db16fe9e29e876420d9b7dbf21497945450691caf10967fae9123b7792da0081984b56ade201b1996eb3d305e625cda9ad00d3adab88ef63425301023364fa14d3bbb86425c707887fbf0026605c6f896e168584dd8d890938be8ca47a0f37a21d84de05372b258c53d478f4e046a2afab2904"}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x800, 0x8, 0x2, 0x5, [0x0, 0x1f, 0x5, 0x0]}}]}, @dstopts={0x3f, 0x211, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x100000001, 0x4, 0x2, 0x2, [0x6, 0xe0e8]}}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x38, {0x6, 0xc, 0x7, 0x7, [0xffffffff, 0x24000000000000, 0x3, 0x2, 0x6, 0x3]}}, @generic={0x0, 0x1000, "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"}]}], @tcp={{0x4e21, 0x4e22, r0, r1, 0x100000000, 0x0, 0x6, 0x80, 0x7fffffff, 0x0, 0x100, {[@window={0x3, 0x3, 0x3f}]}}, {"cd8bcfdde7b02c723e307dbbe9565229f50da90cdfaeea28a86f12eca3"}}}}}}}, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x121) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x100000001, 0x4, 0x5, 0xdae0}]}) 03:41:28 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) 03:41:28 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffbffffcd) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = eventfd2(0x0, 0x801) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x89a, 0xaa2, 0x9, 0x2e70, 0x1}, 0x14) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) read$eventfd(r2, &(0x7f0000000000), 0x8) 03:41:28 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000080)=0x1c) 03:41:28 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@ethernet={0x0, @random}, &(0x7f0000000400)=0x80, 0x80000) listen(r0, 0x81) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80, 0x800) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r2, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3b}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x4004080) fsetxattr$security_ima(r1, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000300)=@v2={0x3, 0x0, 0xb, 0xc832, 0xd0, "d085b03e95dc5362ae205372565b46e8ebc44f1d7c0da7c19ba10d12010f1a24388c816bcab8bdc31e9e5076ab0c68bd6c82567b8d0d77f4a780b1b2b1e39491d031e81947b68ef54fb8ce4ba02269669856e27484e72569bac5360211abafcee2f84cb7d6076f0ad927fa0d5390bf5cc8eee2e618241ae13c6aeef34f3d380698bdbab9d79a1dd924d2cb60b58da98b718e5aae8fdc42730ec09e6845b7f14c0999d240df2f9c3e4fc85426d0cabdeb38b4e0d31c4f514cf20f7b07cc8a3c4290834e4bb5edc04cf0a455318aecf6dd"}, 0xda, 0x3) 03:41:28 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)=""/239, &(0x7f0000000140)=0xef) [ 2194.103391] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2194.368323] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12914 comm=syz-executor.0 [ 2194.907600] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2195.033620] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=12921 comm=syz-executor.0 03:41:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x0) 03:41:31 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)={{0xcc, 0x9c, 0xf42, 0x9, 0x1e1, 0x2, 0x16f, 0xae}, "20cea0a5bc3ce38d5334e5a3abd804a0012928bbc976d3ed2fe25c198e990a0fcb15092304fb0933f805f1160fe5a3bad87ef42a7504a56faec2fb87a1f69248bb3ad0a0e5107ce6d4f6e91e3447c061c23b00769103fcd904c948472729233b15b463d6009506f23d216373fb3a7aa74584e3c2bbdc", [[], [], [], [], []]}, 0x596) 03:41:31 executing program 3: syz_emit_ethernet(0x19, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0x1ff, 0xb16, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:31 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) connect(r0, &(0x7f0000000000)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x4}}, 0x80) syz_emit_ethernet(0x3b1, &(0x7f0000000480)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:41:31 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) r1 = getpid() ptrace$setopts(0x4206, r1, 0x1484, 0xc) r2 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4200, r2, 0x1, 0x4) 03:41:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) getpeername(r0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e22, @multicast2}}) 03:41:31 executing program 3: syz_emit_ethernet(0x2b, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:31 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x84) syz_emit_ethernet(0x163, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:41:31 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$getregset(0x4204, r0, 0x206, &(0x7f0000000080)={&(0x7f0000000240)=""/103, 0x67}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={r0, r2, r3}, 0xc) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:31 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) setfsuid(r0) 03:41:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) [ 2197.350542] kauditd_printk_skb: 83 callbacks suppressed [ 2197.350553] audit: type=1400 audit(2000000492.550:62400): avc: denied { map } for pid=12971 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.381938] audit: type=1400 audit(2000000492.580:62401): avc: denied { map } for pid=12971 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.404435] audit: type=1400 audit(2000000492.580:62402): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.431703] audit: type=1400 audit(2000000492.590:62403): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.455673] audit: type=1400 audit(2000000492.600:62404): avc: denied { map } for pid=12971 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.479893] audit: type=1400 audit(2000000492.610:62405): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.505394] audit: type=1400 audit(2000000492.610:62406): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.532530] audit: type=1400 audit(2000000492.620:62407): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.556686] audit: type=1400 audit(2000000492.630:62408): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2197.582143] audit: type=1400 audit(2000000492.640:62409): avc: denied { map } for pid=12971 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:34 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x7, &(0x7f0000000000)=0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xf, 0x2, r1, &(0x7f0000000040)="54bffe4ad9b3b3ea5fb8ece9e22d0f92ad0dde0ac94cf7cec2ef147820c494ceed0244094c8225db2b47177a", 0x2c, 0x8, 0x0, 0x1, r3}, &(0x7f0000000180)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x0) 03:41:34 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/141, 0xc1d7715302d38780}, {&(0x7f0000000380)=""/144}, {&(0x7f0000000440)=""/4096}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000003780)=""/170}, {&(0x7f0000002500)=""/139, 0x2fd}, {&(0x7f0000000100)=""/24}, {&(0x7f0000000140)=""/37}, {&(0x7f00000025c0)=""/220}], 0x0, 0x0) inotify_init1(0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000000c0)={@broadcast, @broadcast, @loopback}, 0xc) 03:41:34 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x20000000000004, 0x0, &(0x7f0000000200)=0xfffffffffffffc3b) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000000), &(0x7f0000000080)=0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 03:41:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000002c0)={@local, @random="2ab47b8618b2", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @loopback, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast}}}}, &(0x7f0000000300)={0x0, 0x2, [0x969, 0xd8b, 0x41d, 0x64c]}) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x7, 0x7, 0x0, 0xffffffffffffffff, 0x101, 0x8, 0x40, 0x0, 0x8f, 0x200000000, 0xfff, 0xb66, 0x0, 0x7, 0x7fffffff, 0x401, 0x8, 0x8, 0x5, 0x5c71, 0x81, 0x2, 0x8, 0x1ff, 0x7f, 0x1770, 0x400, 0xeec6, 0x5, 0x1, 0xffffffffffffff81, 0x5, 0xffffffffffffff00, 0x1, 0x0, 0x8000, 0x7, @perf_config_ext={0x9, 0x2ee1}, 0x3401, 0x3f, 0x200, 0x2, 0x2, 0x51a1, 0x9ad9}, r0, 0x3, 0xffffffffffffff9c, 0xa) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x105800, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000380)={0x2}, 0x4) execve(&(0x7f00000000c0)='.\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='{\x00', &(0x7f0000000140)='./cgroup.net/syz1\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='./cgroup.net/syz1\x00', &(0x7f0000000240)='(^vmnet1-*,\x00']) 03:41:34 executing program 1: syz_emit_ethernet(0xffffffffffffff51, &(0x7f0000000000)={@random="e5c1a2e67983", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [{[], {0x8100, 0x8, 0x3ff, 0x4}}], {@can={0xc, {{0x1, 0x401, 0x1, 0x3}, 0x2, 0x2, 0x0, 0x0, "875ffd7812572fc0"}}}}, 0x0) 03:41:34 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x204001, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x81) 03:41:34 executing program 3: socketpair(0x3, 0x1, 0xfffffffffffffffc, &(0x7f0000000080)) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'vmnet0](vboxnet1self*vmnet0GPLsecurityem0\x00'}, &(0x7f0000000140)='proc{\x00', 0x6, 0x3) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080600010858596028b07b5eddaaaa270000000611604d56ed08e0000002"], &(0x7f0000000040)={0x0, 0x3, [0x6ff, 0x268, 0x4ce, 0x64d]}) 03:41:34 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) poll(&(0x7f0000000480)=[{r0, 0x1009}], 0x1, 0xfff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x208, r1, 0x10, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbea}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x50}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1e7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x801}, 0x80) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000400)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r2, 0x29, 0x7, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'gretap0\x00', 0x2000}) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:35 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:35 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000038c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) vmsplice(r0, &(0x7f0000003b00)=[{&(0x7f0000003900)="b6326698990f2abcf9c850324fadaff76c421a4bb21dc7eed24421cd562008b83e7cd8097cc1ed2bbcbff4da1104327cbcddaf8c95b641b5cb46d28378403d4374f6aa8f1b0a75e96761e8620cced257fa87887eb5f5be7476d21b792bd729c663e5b1a1d771c092047de7cc2eb36b5776a1d7167c037d625d9c8e870dcbfc66408e75e65db37a733c900fbbfe8d3d64f24354e50620155d2f4e292120aae51b960f25c10416363d0fe189ef5a", 0xad}, {&(0x7f00000039c0)="5bae29153ce0919bbcd33d85c567963c6abeda11ace9b171f29e92789b522cdab99d82926127db193be670a8338ead9186c15450cc0c7576dc2dd9496d0f3a8742a246f1b64343bfb753c9b8d5e2d3f4254b9e8022773a8d90b0ff0fd868e09b993e926410ab66597d88dc66438e6313826e771b525547755fb88bd1c603ed421c26e8f469091a356c1e0dc1302bc4a6", 0x90}, {&(0x7f0000003a80)="9b6852f6ae818d1cbf9391de4981e96e6f625670bc4dfdf5eb2004ee27b9b301f700213c90e29cc6a3ea16bc8843fa3ca8d8a5acb75d3bd3285aadec4e0dc74c638ed4d757005b4d27f1999ae4fffe1175efea0a137280a17507c59be9b006d017dd4341c575e9ceb1c7beda21f7548bb1e612cb4aa79eae8186", 0x7a}], 0x3, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000000)='eth0posix_acl_access\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) rt_tgsigqueueinfo(r1, r2, 0x25, &(0x7f0000000100)={0x0, 0x2, 0x1}) 03:41:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000049d000000000000000000000000000001b0000000503000018030000cc000000ac010000000000001004c1e090e15bc551cc3d95c4f1000010040000100400001004000010159df59c921748da"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x0) 03:41:35 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_r:iptables_initrc_exec_t:s0\x00', 0x2c) 03:41:36 executing program 0: inotify_init1(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x480, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) 03:41:36 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '@'}, {0x20, 'vboxnet0vboxnet1'}, {0x20, 'nodev'}, {0x20, '&procsecurity%wlan1nodev'}], 0xa, "835f1aad0a11b5d21f3edb947d8424ab0685a0849d8773c6728185c2743bec4111edca7e54a492453f947ce781077f8c1269849e304599d0fb5b69d4feb314c70f0fd503691cc4f2cffb041c04b869c6d169775115e42d8d2aa82cbd53e21ad089a39ed3dfc5682edd0fdaaa8e2c7f64d372755ae3ad43d91d95713885850d9cb7b8989062fa88f0853e07"}, 0xc8) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESOCT=r0, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16=r0], @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYRESOCT=r0]], 0x0) 03:41:36 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x10}) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0x7, 0x0, "4ee7c4b7cdaca189cb95076bff3240645cddd6e9d35cd40200293ab63fb78708114c18b853fe3d6e74ef4f485716098aa2d160544a6dce99c3f0900361d10026aa156a22a762d9474a27453d33e634e6"}, 0xd8) 03:41:36 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r1, 0x0, 0x2}, 0x10) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)=r1) 03:41:36 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) 03:41:36 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0x93d8, 0x5, 0x2}], {0x8100, 0x40, 0x1, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:36 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x2}, 0x8, r1, r2, 0x4, 0x3, 0x7fffffff, 0x4, 0xffffffffffffffff, 0x7f, 0x9, 0x3, 0x5, 0x3ff, 0xfffffffffffffff9, 0x400, 0x9, 0x3, 0x1}}, 0xa0) syz_emit_ethernet(0x163, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0) 03:41:36 executing program 3: syz_emit_ethernet(0xfe8f, &(0x7f00000000c0)={@random="e5c1a2e67983", @dev={[], 0x28}, [{[], {0x8100, 0xcea, 0x5}}], {@llc_tr={0x11, {@snap={0xaa, 0x1, "97a3", "e379fc", 0x60, "52f786b1d7a08b6cd5383980ae534455b6482ae91de424950805900e3e2ccc3ca48fb1ebf202280fb0a9c4ff432d3affc8795ae1eb9dec51f89fce1b700aec53b451868478ae0ed9f1bfcf5e9439634c8493aa7da57fa449654a2f83c648407bcbcc940afd1cba2b4e1ca9b3dca92a2c2c404bafa0f54b8d90f5e4fb8cfd4cc723837f2ee619dd999bfec6e252a79c437e9e7cc5dd5537b83478e67f911882"}}}}}, 0x0) set_tid_address(&(0x7f0000000000)) [ 2202.369283] kauditd_printk_skb: 48 callbacks suppressed [ 2202.369302] audit: type=1400 audit(2000000497.560:62458): avc: denied { map } for pid=13067 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.401804] audit: type=1400 audit(2000000497.560:62459): avc: denied { map } for pid=13067 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.427035] audit: type=1400 audit(2000000497.580:62460): avc: denied { map } for pid=13067 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2202.453434] audit: type=1400 audit(2000000497.580:62461): avc: denied { map } for pid=13067 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:38 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="f63c04d1fcde89a33dcca26e81a19e9ce3da95047760d619de1e572616358dc3aa44b5d8dcb97bd8389bdf7472c31d5bb00992ca3b4ba56129d01912b3592a44c5e59e581dd1e1497f2f6410a5444f4011f15a749bd8b8dd9f4f8163863d1f9fcf3f041f0b70a6860d88c7e95875ed5c2070de69b9e84f9453d0c81499c87a817fff65efdd0c6aec6bdff4d930672507ed37901f", 0x94, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r0, &(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={'syz', 0x3}, r1) inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000180)='fdinfo/3\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:38 executing program 3: prctl$PR_SET_DUMPABLE(0x4, 0x3) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64]], 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x44000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa6fe44694a9a7c4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r1, 0x801, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x2a}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x32, 0x28}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x28}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x8001) 03:41:38 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000080)) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)="d11245a418023a") ptrace$cont(0x9, r0, 0x0, 0x1) 03:41:38 executing program 0: r0 = inotify_init1(0x0) r1 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r1, &(0x7f00000003c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) accept4$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80800) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @rand_addr=0xff}, 0x9, 0x80000001, 0xfffffffffffffffa, 0x100, 0xa87f, 0x8, r3}) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:38 executing program 1: syz_emit_ethernet(0xfffffffffffffe22, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) fcntl$getflags(r0, 0xb) 03:41:38 executing program 5: syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0xffffffff, 0x0) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344}, 0x5, 0x1) syz_emit_ethernet(0x12e3, &(0x7f00000001c0)={@random="e5c1a2e67983", @remote, [], {@ipv6={0x86dd, {0xfffffffffffffffe, 0x6, "9185a0", 0x12ad, 0x33, 0x81, @local, @mcast2, {[@srh={0x7f, 0x12, 0x4, 0x9, 0x8767, 0x10, 0x6, [@loopback, @loopback, @remote, @local, @empty, @rand_addr="14aab2bfcd9863b077e487aeab4fa3c5", @empty, @empty, @ipv4={[], [], @loopback}]}, @fragment={0x67, 0x0, 0x4, 0x0, 0x0, 0x1f, 0x66}, @dstopts={0xbf, 0x27, [], [@pad1, @ra={0x5, 0x2, 0x120000000}, @calipso={0x7, 0x28, {0x3f, 0x8, 0x8001, 0x1, [0x900, 0x8, 0x4, 0xffffffffffffffc1]}}, @generic={0x380000000, 0xc6, "b01638eb352a27ed3d05a12bd6e6ec406faade97fbc95456b78f16bb9b54479554c1276213340b3cd6b45d4e0b4e628823108848be57a936cf1a88f7b60c6f4c0fde0bf0a716b13c7a1fe69c1e0fedefe17bd9db16fe9e29e876420d9b7dbf21497945450691caf10967fae9123b7792da0081984b56ade201b1996eb3d305e625cda9ad00d3adab88ef63425301023364fa14d3bbb86425c707887fbf0026605c6f896e168584dd8d890938be8ca47a0f37a21d84de05372b258c53d478f4e046a2afab2904"}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}, @calipso={0x7, 0x28, {0x800, 0x8, 0x2, 0x5, [0x0, 0x1f, 0x5, 0x0]}}]}, @dstopts={0x3f, 0x211, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x100000001, 0x4, 0x2, 0x2, [0x6, 0xe0e8]}}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x38, {0x6, 0xc, 0x7, 0x7, [0xffffffff, 0x24000000000000, 0x3, 0x2, 0x6, 0x3]}}, @generic={0x0, 0x1000, "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"}]}], @tcp={{0x4e21, 0x4e22, r0, r1, 0x100000000, 0x0, 0x6, 0x80, 0x7fffffff, 0x0, 0x100, {[@window={0x3, 0x3, 0x3f}]}}, {"cd8bcfdde7b02c723e307dbbe9565229f50da90cdfaeea28a86f12eca3"}}}}}}}, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x121) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x100000001, 0x4, 0x5, 0xdae0}]}) 03:41:38 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) socket$inet6(0xa, 0x80000, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000180)={0x1, 'hwsim0\x00'}, 0x18) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) clock_getres(0x7, &(0x7f0000000000)) getpeername(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1, 0x0) 03:41:39 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2203.952666] audit: type=1400 audit(2000000499.140:62462): avc: denied { create } for pid=13072 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:39 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=""/18, 0x12) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={r1, r2, r3}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x20b490, &(0x7f0000000480)=ANY=[@ANYBLOB='mode=00000000000000000000010,smackfsdef=(lo,pcr=00000000000000000062,euid=', @ANYRESDEC=r2, @ANYBLOB=',uid>', @ANYRESDEC=r4, @ANYBLOB="2c726f6f74636f6e746578743d756e636f6e66696e65645f752c6f626a5f747970653d73656375726974792c646f6e74d3686173682c0077cfc7193fde72e2946bcce99c1116b36c98986fae03930d047e63254c06c414839db92b564b9a972fa08b26206272eec05b676790d68622a2141f5895e3faca0af5e36ebc847ca473567b"]) [ 2204.077408] audit: type=1400 audit(2000000499.150:62463): avc: denied { write } for pid=13072 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2204.167014] audit: type=1400 audit(2000000499.300:62464): avc: denied { map } for pid=13083 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2204.259190] audit: type=1400 audit(2000000499.310:62465): avc: denied { map } for pid=13083 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:39 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/240) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) [ 2204.354174] audit: type=1400 audit(2000000499.320:62466): avc: denied { map } for pid=13081 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:39 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f00000042c0)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/84, 0x54}, {&(0x7f0000000300)=""/189, 0xbd}, {&(0x7f00000003c0)=""/172, 0xac}, {&(0x7f0000000480)=""/173, 0xad}], 0x4, &(0x7f0000000540)=""/153, 0x99}}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/250, 0xfa}, {&(0x7f0000002780)=""/113, 0x71}, {&(0x7f0000002800)=""/255, 0xff}, {&(0x7f0000002900)=""/153, 0x99}], 0x6, &(0x7f0000002a40)=""/4096, 0x1000}}, {{&(0x7f0000003a40)=@ipx, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000003ac0)=""/100, 0x64}, {&(0x7f0000000140)=""/44, 0x2c}, {&(0x7f0000003b40)=""/85, 0x55}], 0x3, &(0x7f0000003c00)=""/135, 0x87}, 0x1}, {{&(0x7f0000003cc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003d40)=""/87, 0x57}], 0x1, &(0x7f0000003e00)=""/129, 0x81}, 0x2}, {{&(0x7f0000003ec0)=@ax25={{0x3, @bcast}, [@netrom, @remote, @netrom, @rose, @default, @netrom, @rose, @default]}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003f40)=""/65, 0x41}, {&(0x7f0000003fc0)=""/220, 0xdc}, {&(0x7f00000040c0)=""/219, 0xdb}], 0x3, &(0x7f0000004200)=""/178, 0xb2}, 0x594}], 0x5, 0x40002041, &(0x7f0000004400)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000004440)={'TPROXY\x00'}, &(0x7f0000004480)=0x1e) syz_genetlink_get_family_id$fou(&(0x7f0000004500)='fou\x00') prctl$PR_GET_NO_NEW_PRIVS(0x27) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f00000044c0)="363f45aeab402ce4ce7f7dfd54bc5b", 0xfffffeec) 03:41:39 executing program 4: clone(0x802102002001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2204.493796] audit: type=1400 audit(2000000499.330:62467): avc: denied { map } for pid=13083 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x4, &(0x7f0000001500)=[{&(0x7f0000000380)="2d9abaf8a65bdd9ef969d52da60ef319c9c851ed42e0e12b87f19ed5c5308d424ebecd634acc9aebb43a67816cdeca534f912684f226d782315f3bb67fe3bba3aa7dba57185ff0c7c006051ed4d448b9fced6047f476f42523e9b2ccf706da96216f7a342794b05658490d1f74348bc901f1ea12df1d544e946f0641ec248af46839ea222f14", 0x86}, {&(0x7f0000000200)="343d5280", 0x4, 0x8}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="d47c96905df0c0c381588fe1e0924014bc3ddfd2fd0f1b37f0ec577812ad5d423130b23694d25ba302a129752c6ab104ee4ccdd3828a87efc52328a8b640936ae1210eff35b565e96536a4ee6b717eb08eec0ae44014ac110638818a1ba07533d90849b9dd91236286ba8133c2dad8f8cfbcdc3308906ae8014c44acac376af7c51e862a03da37154d43e4380efaf994b1cc44a3778adab6f4241809889ef6e32e9edd8b846556daa6878314e84c", 0xae, 0x7f}], 0x200000, &(0x7f00000015c0)=ANY=[@ANYBLOB="646f74732c6f626a5f747970653f6574683162646598522c00a5aa0579da13a24519f5a3bb12f395c71a24186f16acbcbf65ee08d3e0204223e0c521d6b9a1d5f11577c16cef84d15046c9a264f9256b7f17510370494d0d50c197"]) syz_emit_ethernet(0x2e, &(0x7f0000000280)=ANY=[@ANYBLOB="e5c1a2e67983aaaaea02907800000000e00000011100907800000000005d5238b6531d38d1e8e000080441ea5168042f010000000000007fac7dd5ffff00005887066f32e95e074a99d8837a32142bce60c2182dedc48f221f4d12b945d3e2b1bb2011da57c23cc66d9fdf150a3a862dcdcff4362315e9a200cc26c072124e8b9356b97f54a305bbbbac1c0dccbc4db976cf7295079de0d439bed12c42be07e32cff424352ac6e63187e70e57e702f56fdf405f0519dadb57008032404a4f6fc1a088ae35f5d30f1af2fd54d92efad0154803b62226cf8d79be28f76ff"], 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000080)=""/1) creat(&(0x7f0000001580)='./file1\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x4, 0x4, 0x1, 0x1000, 0x0, 0x7, 0x10, 0x1, 0xffffffffffffffc0, 0xe2f0, 0xfffffffffffffffa, 0x6f0, 0x20, 0x4, 0x3, 0x1, 0x1, 0x3, 0x9, 0x9, 0x8, 0x4, 0xce1, 0x4, 0x800, 0xc26, 0x1, 0xa4, 0xffff, 0x7, 0x1896, 0x800, 0x7ff, 0x3, 0xffffffffffffb21d, 0xb1d4, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x10001, 0x401, 0xf0c, 0x3, 0x80000000, 0x5, 0xe4c}, r0, 0xc, 0xffffffffffffffff, 0xc) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000240)=0x9, 0x32d) 03:41:40 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000240)=0x54) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) getsockopt$netlink(r2, 0x10e, 0x7, &(0x7f0000000080)=""/231, &(0x7f0000000180)=0xe7) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:40 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/246, 0xf6}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f00000001c0)='net/ip6_flowlabel\x00') 03:41:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:40 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x56, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [], {@canfd={0xd, {{0x1, 0x10000, 0x401, 0x6}, 0x10, 0x3, 0x0, 0x0, "a528c02ba2f644cfd561b285af9104e80651518bae6ac25601db02ea511d1bf15868b63893e97f4a04805e4e84921d706caef3c6e47cfeccb9967f83e745130f"}}}}, &(0x7f0000000080)={0x0, 0x4, [0xd9f, 0x1f, 0xe98, 0xd46]}) 03:41:40 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000080)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x8, 0x8, 0x4, 0x4, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0x75, &(0x7f0000000140)=""/117, 0x41f00, 0x1, [], r1, 0xf}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:40 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000240)=0xffffffffffffffdd) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000008c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0xdc, r2, 0xd00, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x312}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffeffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x40000) syz_emit_ethernet(0x5b, &(0x7f00000000c0)={@remote, @empty, [{[{0x9100, 0x2, 0xfff, 0x101}], {0x8100, 0x4, 0xfffffffffffffffd}}], {@ipx={0x8137, {0xffff, 0x45, 0x1, 0x15, {@broadcast, @current, 0x1}, {@current, @current, 0x4}, "286a6875285477d045142f1c97c397bcfe986ea6a127319dc0d33f7affd2319c5b914140865164"}}}}, &(0x7f0000000140)={0x1, 0x3, [0x927, 0x99a, 0xbea, 0x9f7]}) 03:41:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipx\x00') syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x7, 0x101000) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000080)=""/65) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(r0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) ptrace$getenv(0x4201, r2, 0xfffffffffffffffd, &(0x7f0000000180)) getpeername(r0, &(0x7f00000001c0)=@caif=@util, &(0x7f0000000240)=0x80) 03:41:41 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x5, 0x100000) tkill(r0, 0x32) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x6, 0x3ff, 0x6, 0x7f, 0x3d0000000000, r0}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sync() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000200)={0x3, 0x0, 0xff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f0000000040)}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000240)={'yam0\x00', 0x4}) 03:41:41 executing program 1: syz_emit_ethernet(0x72, &(0x7f0000000080)={@random="e5c1a2e67983", @remote, [{[], {0x8100, 0xffffffff, 0x9}}], {@ipx={0x8137, {0xffff, 0x60, 0x10000, 0x4, {@current, @broadcast, 0xffffffff7fffffff}, {@random=0x7, @random="3c2c891ec5d1", 0x101}, "c1a2bfc20e757efbaa924bca529fc737a3cfd2077c0a4d85788d01a72848c551c773aa5038dd8b1a140a2f89a3d07c9c8cf1adf22d429a8bd308cc2442c98840637f"}}}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) 03:41:41 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='posix_acl_accesstmd5sumem0,{wlan0\\cgroup(-\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0x2, 0x9c}, &(0x7f0000000180)={'enc=', 'pkcs1', ' hash=', {'crc32c-generic\x00'}}, &(0x7f0000000200)="576c1a6056e55bfee77df2bebbe4ffde9dc31aecab60c553903d9d3a52c2a22884afdca19b20148bfb42c5679876a8bcab3922383e41ae73c7c7a214e4a4a4c66978aafd6eea01a1629e7266b0e7e9eec3cf30ee587bf7776da597", &(0x7f0000000280)=""/108) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0x1024) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000300)) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000010c0)=0xfffffffffffffffd) getpeername(r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) 03:41:41 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 03:41:41 executing program 1: ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6e, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) syz_emit_ethernet(0x10b, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaa1eaaaaaaaaaabb91004d00810015000800418300f50065fffd041d9078ac1414bbac141424862c000000090107268bf483390612deb762ad1c3cdab3ee27c59544064f5f070eebf8ad1fbd475172d20000010100004e2301800000002101000142a600018000000002ff000180000000c1010001e101000161060001a1b3749f73ec0100011c3a9cb1e0246725001ff3023ae3aae99e5c71ee37a9b95c4786d553ebd1f91f80913fbbca7e69bd76bc2a2a304b4b70983235ccb85d2396d095924ddf8b154458833b912275e7f013d17f27a880903c061a294dcbc40c0aeec4d105756865e215e0342678ee692982ca4cc53dc1000000000000000000000000000000000000000000000000"], &(0x7f0000000140)={0x0, 0x1, [0x666, 0x714, 0x610, 0xdc2]}) 03:41:41 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) write$apparmor_exec(r0, &(0x7f00000000c0)={'exec ', 'vboxnet1\x00'}, 0xe) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000000)=0x8a5) accept$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@can_newroute={0x54, 0x18, 0x4, 0x70bd28, 0x25dfdbff, {0x1d, 0x1, 0x1}, [@CGW_MOD_XOR={0x18, 0x3, {{{0x3, 0x5a8, 0x2, 0x1ff}, 0x4, 0x2, 0x0, 0x0, "6a15ac1d6244698a"}, 0x1}}, @CGW_MOD_XOR={0x18, 0x3, {{{0x4, 0x8, 0x2, 0x800}, 0x5, 0x2, 0x0, 0x0, "977cb3860c05a7cb"}, 0x1}}, @CGW_DST_IF={0x8, 0xa, r2}, @CGW_LIM_HOPS={0x8, 0xd, 0x200}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x4000044) [ 2207.428255] kauditd_printk_skb: 137 callbacks suppressed [ 2207.428265] audit: type=1400 audit(2000000502.620:62605): avc: denied { map } for pid=13180 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.456412] audit: type=1400 audit(2000000502.620:62606): avc: denied { map } for pid=13180 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.478899] audit: type=1400 audit(2000000502.630:62607): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.504089] audit: type=1400 audit(2000000502.630:62608): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.528900] audit: type=1400 audit(2000000502.640:62609): avc: denied { map } for pid=13180 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.551634] audit: type=1400 audit(2000000502.640:62610): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:42 executing program 0: r0 = inotify_init1(0x0) r1 = dup(r0) getsockopt(r1, 0x717c, 0x5c200000, &(0x7f0000000040)=""/124, &(0x7f00000000c0)=0x7c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:42 executing program 3: prctl$PR_GET_SECCOMP(0x15) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f00000002c0)=""/14, &(0x7f0000000300)=0xe) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000d87000/0x3000)=nil, &(0x7f0000ea4000/0x4000)=nil, &(0x7f0000f04000/0x2000)=nil, &(0x7f0000ebd000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000100)="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", 0xff, r0}, 0x68) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000280)=0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000000), 0x84800) 03:41:42 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={r2, 0x1, 0xfffffffffffffeba, @remote}, 0x10) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x2c) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f0000000040)={0x200, 0x3, 0x7, 0x2, 0xffffffffffffff31, 0x4, 0x7fffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:42 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xc9, 0x0, &(0x7f0000000000)=0xfffffffffffffd7f) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) getpeername(r1, 0x0, 0x0) 03:41:42 executing program 1: [ 2207.576768] audit: type=1400 audit(2000000502.640:62611): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.607335] audit: type=1400 audit(2000000502.650:62612): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.709640] audit: type=1400 audit(2000000502.650:62613): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2207.742467] audit: type=1400 audit(2000000502.660:62614): avc: denied { map } for pid=13180 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:43 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xffffffffffffff1b) bind$packet(r0, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x80000000, 0x6, @local}, 0x14) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000300)) syz_emit_ethernet(0x163, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000340)=""/4096) pipe2(&(0x7f0000000000), 0x0) 03:41:43 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 03:41:43 executing program 0: inotify_init1(0x207fd) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') shutdown(r0, 0x1fffffe) clock_getres(0x5, &(0x7f0000000100)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:43 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x7, r0, 0x0, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="40fe43aa4a984faf8aaae37b25b3b3f5c610fa1592bee4a278cc1fec92f63fcb94b702b961b6c17a9e0a002e4908f3f5752ff0c39b418a12932d37bc886614a0c84cd1d77a9ee020cb37ee551d9c7194311075dbc4da6a0f83a0bbc63320a010d8ff8798b45412717a1effa9ec70bb671cef7345856e5ff1b525e4218192213ac01af456ca0b0a40f2e45e8b32848e042b5a951270757b85b4be9dd45c4ca7167be69be99639b769cbe9731bb4c53403fbe2caefecc6639465cc852eba074e5acf788d7d431e3c5b899da913801e681cf161897dd5120c0535aca254df367913e2a4e6bb69", 0xe5, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='cpuset\x00', 0xffffffffffffffff) keyctl$unlink(0x9, r2, r3) tkill(r0, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:43 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000000040)) getpeername(r0, 0x0, 0x0) 03:41:43 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x0, 0xdf]) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet(0x2, 0x6, 0x7fffffff) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) pwrite64(r0, &(0x7f0000000500)="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", 0x18f, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:41:44 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000280)=ANY=[@ANYBLOB="e5c10800450083bbc697180277b790620000000190780000000000e0000800000000bcc8f0ddb3580cffffffffffffffffc4fe012ba91b1037b679ba7c776ba89b1dd7ace4e1f881ec3157bc6a456e231364edc14a872396943c83fd2a3559aaba1d41394a048672d7960c9604085dc89360d842057cb06f42439a970cd5380e24b4fee1e3babe4b32d60c80ddc5318f44aa5c6217102eb8cfa4dfc275388dee9195204b22344768b42067ad0a016844859addcd3a30cb6b77d8274b96ba674ecd8f46e3c44c0c10cbd722c4d94c63112e357fcf694d9dc0b3be91e77f7c98c0629724a5f1e3e5aeb924d81df0"], 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000380)=0xc) r1 = getpgrp(r0) r2 = getpgrp(r1) sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x3) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) keyctl$chown(0x4, r3, r4, r5) r6 = accept4$unix(0xffffffffffffff9c, &(0x7f00000001c0)=@abs, &(0x7f0000000140)=0x6e, 0x80800) ioctl$sock_inet_SIOCGIFDSTADDR(r6, 0x8917, &(0x7f0000000240)={'veth1\x00', {0x2, 0x4e22, @multicast2}}) 03:41:44 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='%mimepe\x00\xeb\xd5\x00W,\xd4\xbfBp.\xdb,y\xc5\x7f\x100&\x133\x1d[\x04\xd7.\xe1\xf9\xa1|-\xb4\xc3\xe5\xfcB\x05h\x00\xb0\xd9\xd3:\xfd\x1c\xb5\xa5\x12\x02\xe0B\x1a\xca[\\\xa4HP\bt\xbd0\xf6H*v\xe8%\xd3\x994[\xef\xc0D\x00\x00\x00e\xc0\x8e8dJ\xcc\xd5PM\xe3\xaa\x1dx\x93\x01a\xa1\xb8\x9eX\x9e]\x0e\x9e\xcc\xbc\xd9x\xc3\xdd\xdfGtL\x94\xb1dB\xc2\x8b\xda\xcd~uiR\x16\xf2)$\xd4Q((\xaa\xda\xfdta\xb3G`\x85\xe5\xd3\aix\xc5\x9avJ3\xb5\xac\xc3J^\xf9\xe2\xeb\x1f]{\r\x92\xa3~\xbazB\xad\x8a\x96\x1c`\x0f\xc9\xef\x81\xacP\xc4g\xfe\xa0\x1e\xf9\xf0m\x05\x00\x00\x00\x00\x00\x00\x00r\b\xedp\xdd \xc15\xf5\x06\xc4\xb3\x13\xad\xbd\x00p\xa0M\xa1\xd5\x1aK\xeb!FH\xae\x98\x91\x05\x1b\xf7l\xb4\xb2z$\xc2\x02\xff\xc9\x9b\xac\xd6\x9c!%\xcf\f\xd1\xc6\x8e\xa0\xa8t\x1fHs\x0e\xad5\x8a}L|\xd61\xe5\xe0\vQ\x1a\x816)>\xf7N\xc6\x93\xe5\xa0\xab\x8a\xf3L\xca\xfb#\xd6\xc2{\x15\x1f\x1f\xb6Ql+,\x9d\xe5y\x93\xb9\x95\x8cN\x0e\x1c\x04\xdb+\x89\xfcz\x11\xe8\x90W\xbbP\xd0\xa7\x1dzx\xe9\x1f\xfc\xb8\xf3\x14\xc2\xf0l\xf4\x9c\xc9\xec?(\x1f\xe8\xee\xe7\xd8\f-\x03\x19\x90\x86\xef\x1f\n\r\xf7\xe8\xa9f\x10\xbdr\xe4\x8b\xb4\x00o\xda{\xf2Y\b)\xeee*^\xe3\xfaw\xc9\x98\xd8\xe54\xcd\x03_u^\x19\fg\x00^\x01\xc2\x9eSmC\xa2Zvt\x14\x01Ic0\'\xe6\xcdK~\b\xb8Kv\x1c4\x90(\xf3^D\xa9y\xab\x15\x9a;\x1b~/EW\xa5^\xf0\x8e\xde{\x8d\x92Zc\xb4\x18\xccP{\xd9\x1c\xd2\x05^G7\xf8\xbe\x8a\xca\xbc\xf8\xdd7\x8a\x94HQ\x8c\xf1_W\xae\x04\x94zPN(R\xa0\xc5\x00@g\xe2;\xd3h\x98z\xe8\x18\xe2\xd5\x19\x0f\x12\xdf\x95Ks\xe2\x87\xe0`y\xd6=\xd5DT\x06\x9c\xfaC+PQV\xcb\xf44\x86+s\xa6\xa7#\xa1\x95\x15&&pk\x16\x8e\x01\x9f\x90\xd1\xa4\x9f\xc0\xf9$\xed\xfcM\x9f5e\xcb\x8e(\xbf\x82\xdd\xe3X\xf0q\x15\x110M\xed\xcf4\x12\x1b\xbcF\x91\x88J\n\x16\xfcg\x05\xf0\xcd\xc6\xe6\xcao\x85\xb92\xbahOE\xeaF!\xb4\x8e.\x1fL\x06z\x9d\xd2\xd3\x83,\xf5\xf6\xeb*J\xe9-\x1a0\xe6\xe0\xf5!\xbfB\x83LQ\t\x1d\xd3G\x87\xf1D)\xf5]\xf7u \"\x15\x8f\xb2\xacD\b\xb4\xe3\xe5\x1c\x0f\x17\x0f\x1a^\xdd:\x8d\x0fb\xd9\xb6\x88@\xe2\xdd\x8e:d\xf2\x8evp\xab\xc5\xf1\x13\x17(v\xa4\xb6W\x81O\xb8G\xe2\xe1\x90918\xcaU\r\xcc;3\x06\x80\xd7f\xa6}\x10\xcc\xcd^5\x9a\x88\xa7\xd6\x96\xb6p!a\xdb\xfc\xda\xd5\\\xac\x99\x10\xed\x97\xdfk}8\x1d\xa8\x97\x81\x02y\x9e\x05\x98}$\x91\xf7Hg<8\xe4e\x9a\xa4~!>r\x16\xb5VJ\xf6H0\xf3\xb5n\xed\xeb\xf60\"\xa4\x8d\b\xf9`N\x15\x96\xd6\x96\x8a\xf4\x96K$\xfe\xeb\xe2,\x05/\xe4Y@r\xa3\xf8\x86\x8c}\x0e\xfej\xbd\x861\x81_\v\x9e\x1c\xafU\x8c\xf7\xd33\x9f\x92\xabxB\x17>\x98H\xc7\xde\xfa\xc4/\xb3\x16\xe5U;\x86A\x92\x99\x7f\xf8\x1f', 0x2) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x3, 0x0, 0x40000004) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:44 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xd) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:44 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) 03:41:44 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000001000)='/dev/snd/timer\x00', 0x0, 0x40) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="e2347f6a5af1693302ac273254becac47804d4ad00d28007eab55b68735f37f72aab87f45dc28b743f79ba24e0b2b8dd0eeede9cdbc4c4b2f7f9c8369594f4256aae2877e0acaeea850473c497e0603fa3a8fc96eb3e6cc472466bdc5ed90757ebbce0bedcf776e884da5b45a35c46e489bd68e4344d550138cf6f287a5a23984b3058e4735e2714f58ca75a1a088303fca76e6d58f4e54bbf9e283f8feb872f9a92d38be48d77b92565ceb353938c735ca6e5a689a47077aef91a3a55ecf35008799853f2c1607b8403f9b64fb69936bafa530e82f0c5c4b85a84e8f793b8fbc6680df19ee1200c28786cf17a05318d73d8c802add9fc21559435b07f7e623df54cb271b46345826bbbc3a7e9f8c06b2336514c65b2866693275ca0c35c06b606f39e4ad47ed519a2b744fabc669122c02e28a0e0d1449a05f850e4e1a9a3959167fb944155fa204b07258c3596c09e407be6def09b2826562e9f909b44c5413824942deda8a8b1339659cfc920248e7b82501c41d922ab422f947886dda64b6afb95fff0ca525e5e0062d000bd5f9f49ba729b7f0b6bfc4d04b05b59fceb3dc148bf7e9b11c4892b811461cc7d7c1d4fe5b408d24d429720d36fd01c982fce6f937f6a416672aaa87a6592127c38041cdf9c5c2c3e2571a9b983c81f9c5359e9798c3a8eff8985274f7e2ad9db7966b4eb402ae15c71131cc644f4e7e5ca8de443956c108c2518766794f7a674ae863bc5a816a48b6fc65f50ec53ec935423a3189bfb8ffc6deeb460b7a28388a91301f40b430d15970a4604b7ed24cd8e5569d95f0c8a5b11731000373b9caa9bc1aefba80679dbf0a5581183c77a4a0ca3d2c0e540d059ce2ad27d61f34f65093e450cd195006daf92668efecd2e00184e3a0376aedecd4d6124fc54752b3ebbb539499870c3b47d49572737f865f5e2ca4e723152482ef6f100c0c8483cb93b8ee5bedeaabd07d536cf965e733bd4d568d92fa391ff4936c6727b18132c637cb88cd878b3b79768ab7918a2e0ec3615833475c40fbb54521afe51149dd1a39f500057e7e52f734a48244f8f0e15600a13f8887624b858169779eb7a978873592734c9ea1f108004d41191a2e9e499c5b700d3189ad70406f3ca58073b0985ca0f1df7271eeb55c125483848ae363b836f7b0ee6aa252e21c083b3f531f2555a012d32dc0ce5867d670845b1b7b9fee8900e606d5d69be5e5b601cb86cbf3ab630d9240d4bf357bf61522f1e2450551c0f31e457a513d587514aaa89ba33c023d87d63a3577f2267535975e1351fcfd34c1c34dedac6bed5c8517db36c8f26932245345122ed70544c1fa051638d02fb74b37aeccb5265b908cc296627935f6351ea2a4be56a21f578f607f49ff1d3aee7b322d7687e09f5c7abdce8a29d4bd65f3da611431b27509f1fafac6d99bde06198bfd682f6f3fd76ca38b15c8b917d5af9ad904972faf0366ae9bb972fb742c9bbb3342c86832bac4f7623b4661d9ee1969d3045d8fd76b0ad4d2126d75ddeb488a931b61d74dae875c662228aafa2385bbb39c70796413e87c7a8dc16bde33f45c39eec980b9ef3ce9c3d572c68852355b67611e8d984bdac4d6fa500145e5a49751f9c47604573c109d1a2acfa681d043c2764bbabe0ce550298ad88c1158db2dc6f2db29195775391b07de0ba908248c43b58b5b6632ddad4452eb69cc966e22a74227bbc9b27ca8094a0c996404180840fec3902f81f97cbf69428abae9e5461d82ab2b78319754a7c20ddac88e8304c939b1dfb524deee2d54d987f1524d16ff9597211185160e7f7e927d54cc51f766a938acb2acd0c28acec3061f9578a9d3f9092a8c163b283fce7fbac70cfa13367ebc3ee2ea5c5f1560feb7ca0d2575aacec992b187401c2eaf2c977aedf0c6f8e612a68bdff3804d5778295c39bc1d1e0f1201d2dbb2a025f314f70e417092fe2af6d9ce0b084708522f1f11f86f76e504e15efcd4e16b388792acb247b5171930bf208868dac0ab808dd306ae32ceae64d93dd6c63824b338a03e3c343bf8fe855b430f89ebd04496a7bc84b9ee3b521a5161412c44a934104696dcda38aef7567793b1ded56e8a4e4f6e5a57125d72a23c1c05443c920862a544b832b01f7b8584d1a0bdd8f567f9cefb1f9a51c0f265959f2c4a4caa24f64732ba25b582391e7cac65d37f1b24b85eb2249ff400c42bdf943d4f7f6724f3f4c94b2e481d582a9b28721b76aa722eebba99323f1799be5f4b9b6da82ad94f45bc1dcde79689ec713eacb3723ae2f83afaad9479fe2f2855427de8738e960600900efbc48521b52eb105498a4e5998fe992399fcb3d5c683298492f27a825ec3f8fd3b62328b3294b8ca07b9b37da60d7097fad258327b180cdf1fb540f2d42b87f69c59f65b2ede3d51cf32b2a274a48e62208065e7b81605324c73afb5c75d301eca0545ac60a7e9bd1be11b9384219c7c71618a98cbdc8bfafdff7288a51df5f02a9ae4d3ce5cfa18faa4561ce0eec6ad8360870256be9e3925e6f40d35f567f34416a5867dc0fbc209e780fd106003d918585cd450da365ee28b88552141c2b63ca834ff87bc0f2626cc2ed0777eafa3207455900356136a19601e7c7009a4492c4708414b9e14706a5bc57fb2c7470e5ad4d72c110d92b3b2b1e1b975659fc70f8bd0a767d517ff4ebb0e4d691c20358795a88e3aefbad74061ba0cd953b5961dbd332282057603e0e217eb71068e0622a11d0144d546300a13d862aa3d785e98b1db4e4511a3dcc29ff2987afd87b1a2b977f57d20b119046f58b5c77bb2cfd2c38e80de91e4103a938bf1d4d66f387e30ea5a8dcf94ceae8719933630d3d431988acb47ec64e4d5ceaaf30688249432e94959acfc33b0511f579ecd1f2afad98c5f1c5d99be2814f63b8aa4f27a11e17f68cfd7ef021816a32ba143a73cde01b75fb35be48c15344105d6a49fac29d89a2ad73b93c14352c8d49185cc36e2634fffeb24d506c1331ed8183b6b294e9afd497dd6daba6ecd0470bbb6f5816cc3ed1de598bd737632ddd6aa08279a2fbb004ffc870c02676eb5dff23222575e7d94fdd3195361c64dead3e8f893fcf7d52546e181dd90d3ac0bcb57212d144bedb93b09728371f9b244f6c0ada4eb0cc896e0f393879f8c504135f8a90b0c738637db2d143e35fa9342c8f1a4509f4ccc9699551408268702b515dab5ddd3aaaaa0cc2cff4689ac786204bfa0a6d8cea689cb05e344cb749a26b17f2e8e8ec0ee29446837ea5e02e313c1cc434b715b8b4f74072262dc0aabb4bc02d7e5113427371bd967c1ac2e092246afc2d023be4f8c501b8fd7ef7a14a6c9baf4aa8fd6c4cd6de93425bcbbe7b8e5b5704c69ca42fa424699b30e2cb8371c1e0da36e6d553073c74ec2acc4564e01811bcace99c510c16ebfdf1c55f1cb3307ebdaedd6d7f00fd7b8863239239d965770e1c587c2d334f1292ccd7b266c6753f2acdd193edd66828fa65dfb3f718b7e2e683b7f20c4d55c17153734bba3fe7c363d6bea98a93e58c8ab86ee375e8e9f14d94084192eb6160ccf05766c5d5fa24569e6bd09ffc91b5a8a1c07691a9086e143d3f64bb7a210f2358693b040c4aefd1905618071c8002787218e149ccf2c7ca640317a661eb198e8f352724bc99947f61b541f19d052a90673169e27b680e9471d8f750181a9990c804ab512c58cd0a6b45546ca57a807f4ccb548cf99d043193eb2b00e171ae577e60ddb3f47b2d4ab474356a206afe057eb1312f3b1b11087b54fdccdf05ba650eab37771ff453858a8c05114d41d534bf440a70791d79797f4c660f2d73b6b79c98502082f1c13b7d438c7c2be59d62ffdf08a0e7492bf1beb6806784b4d6d3a051b0fa03d3263afd4ff6c3eba7e098a8b7a02924e06a3d06d26eae8a5c564db02f5a41750c0b16c37ce2906f1df696e954361403648363261cbd240e14af8eb6dc8133471b1b4058fc1af86b12494743f38d8b7117253d825de0871756b97b71371df4a9578378919d679558332efdee386953b3d7de9e742e7faa86ee45acf9d85cba4027c6ebce1b830413e70e022a8f8bcb9d26623b9656adf01d03aecd37966dbfa3ec86ec1da2cdc04765ef5337ad9119d0b8afe55f6d292caa92912cc5286d7def689a621cbdc76f897681d528ee3e5ce11b2255c06e85ca13063f532c608f770c28682276eb993dedc1b611825b14de7bdaf588d7217231a09581ce45ca627961c82361d8930a87a3f9a100a0e6b690131590d32499a102d9d7a5d25e08d35359a39e181a73516eab06e4b970436833a6ed1a286f40a915e082b0c26e9bbafc89438e5034b909948d360f156e69d399ea2a029ff84b08684d2d849dba8eadcd72347afbfb2be8746ca4e171ea55ad05dd9aa41881d32f53f6b9ff1e5554fd3e4ed82d7d0944ce7b3c3b97e66c6f6905c2af3b042b33d7fe25220b676b669398168df8f392af5ec9701f7b21e518df3ab26bb6eaf035482fab61f47e895ed14db26538119ba05ec631d523f95d2e0be8e5fefc0b3b140ee08923064adad3406bb4af268d9a15db2a4494858b1f80ec8815105afb0da2ec7bae9c183572600f0859a924aafc0d8c929c9f9a008077fa9e9572d19fb6d660ea8d5e5eafacd75dd584679b1a602aaaee44ae0b641669784d71d31c1d6580827ee262bd8152c163eb246728986cfbbcd5fb7ee5afa2773ca246b5354c07b4218e48630ab0661e64d76d1165ffeeee0ff3102ec52c545ab7d2aedd7181ce6ada72d0c3f191a044962212e9b1679463639f70ed4fe8738c6801a3d13b5399c769dc90ecca4dc3eda2b120deef9400462b43116e694e5bf8f105af3bca7a50723676202a9bec59020d889136e3488857caa162d95ee2b7f3b285259103ac3f1a4be5b576811cd1b9e84c0faceacb27be1821c8982531da659ede9217ebbde44706f92df361bc218d4090759bfd779edb6234e09df050e20479dfc1098e8417263936252dcb6029edf4ea062fd4ee5d7d45ea600e33869eea333ff1a7bc5c89e5f5bdf5830238c4a5e08475d9f59209febd703f997340dc66a0dfc51af000bade2d5d6a7d4c2b7a05f09d6a6a160de0113cc587e964ab961daf78edfde5899890f1e8cbb500243428ad11754cf58cf41fd98578b47c62d509773d0f2d1120a73e79442221b0be842e88f1443121700da35bf6139f0138b796868ddb237de7df09af7870950b24dd09c564392a37c6a639e6a31a019b85410608eb23364e641bb8abc05a61f8b436b431005d520f0cf00d9587214c5dee8c3abeabfb4ab015fefebd3d44d3ff90976efdb56b8a0a7d6c42117718a81546d501c7f2fb2b86edace60a0d95d41c7aafb4512c44f91a292476ec6a0c4927288f34d5dae8033b0f026b5ece0d67590d59df55e7ef17345771650f39517b0f21b8b12ef594cfd50335f6796c0d58cee6a0eb6ffa88eac4ec0d4671c9fc057dcca275a3860f3c0acde341fbc924e6991082f4f334df881845b4427f3697d619178dad751ee491695b0d779dbbe73635cf2439f49ca537c57d1b641375c208d15335c0d0cfa6797e29252f32a45a1e4f68571b6ef49f40226cd6eefdbfa736c1607e94db7441abab053180acb6670c933cc9d8281ad4d49ee3c87f571caeaa4a6b409eb6d5d299a6a9d459ea2573ec9a20dc2febdf8aeadfb15c2a41ceacae225b898973acf035055bf0a3b831a1b4956e49e28a5829df730e4577886ce7f3b6d36d613976be48a55a446f5ca1", 0x1000) r1 = socket$inet(0x2, 0x800004, 0x3) connect$inet(r1, &(0x7f0000001040)={0x2, 0x4e22, @remote}, 0x10) r2 = dup(r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001340)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000001500)={&(0x7f0000001300), 0xc, &(0x7f00000014c0)={&(0x7f0000001080)=ANY=[@ANYBLOB="9352ffb1890000f1f5d38f70", @ANYRES16=r3, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) 03:41:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x124, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1800000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4b4000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x16}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, 0x0, &(0x7f0000000040)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000300)="51139de84677f3c66ec6aaf8ab516cf2e53d4a67fb7fb7a17cae4991af7aae1aca78024d22cd9a50d2a7dc35f69e8be627292124251fbaaefd7454f88026c2d715f58b4ca3f1527ed798bc3827bbb31aaede9a478441acd8e11a74c7ca761bf0f4da29322ae2821764848f4872dfacc6f57d7f779e89618ae4fa7a1dd63da7e0d8b58ea1e3b3a5e383e7db1c86f2b28707e74d4e108445667e54bcac6262116514316aa834de0a6c9843811d60e2eecff32d5bbd64f3d7876ccaedd2f2d215b6598c2104b027f4b7726f7e8b04a9352c18e649b7fb93444a2d26428e362353d521f5504370efda37f036823c488e") ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000080)) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:47 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="c5c1a2e679450000200000000000029a7800000000e00000011100907800e00008"], 0x0) 03:41:47 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 03:41:47 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x5) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:47 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:47 executing program 1: syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x0, 0x81) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c2000003000000000000884700000000800e00900000000000000000000000000000100000000040000e0000000000100000000049f000af00660002005e907800000000ffffffff865000000379001239bc4e4f099ec25d7e883d3f82d31dbc03046055010475c1070546f1b800125b582686d11108ca7cbd5412e1b94074010747e71dead50708aa2c90a0d77007047ac607069bf455f44e214e22", @ANYRES32=r0, @ANYRESDEC=r1, @ANYRES32=r0], &(0x7f00000000c0)={0x1, 0x4, [0x9ff, 0x5d3, 0xff, 0xf42]}) r2 = socket$unix(0x1, 0x7, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e24, @broadcast}}) syz_emit_ethernet(0x5, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:41:47 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x8, 0x0, [], [{0x1, 0x1, 0x3, 0x7, 0x7, 0x5004ab1c}, {0xfffffffffffffff7, 0x80000001, 0x8b10, 0x39, 0x81}], [[], [], [], [], [], [], [], []]}) getpeername(0xffffffffffffffff, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xb) 03:41:47 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 03:41:47 executing program 1: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:41:47 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000000)) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:47 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:47 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0x42191df8) syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1a2e67983aaaaa2aaaabb080045000020000020000000030000000000e0b40001110090780000000000e00008"], 0x0) 03:41:47 executing program 1: getpid() syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) 03:41:47 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0xb0044, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) [ 2213.251806] kauditd_printk_skb: 82 callbacks suppressed [ 2213.251812] audit: type=1400 audit(2000000508.450:62697): avc: denied { map } for pid=13294 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.282293] audit: type=1400 audit(2000000508.460:62698): avc: denied { map } for pid=13294 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.304807] audit: type=1400 audit(2000000508.460:62699): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.331227] audit: type=1400 audit(2000000508.460:62700): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.355287] audit: type=1400 audit(2000000508.470:62701): avc: denied { map } for pid=13294 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.380197] audit: type=1400 audit(2000000508.480:62702): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.405098] audit: type=1400 audit(2000000508.480:62703): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.430547] audit: type=1400 audit(2000000508.490:62704): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.455141] audit: type=1400 audit(2000000508.490:62705): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2213.479592] audit: type=1400 audit(2000000508.500:62706): avc: denied { map } for pid=13294 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:50 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) ptrace$getenv(0x4201, r0, 0x1b2, &(0x7f0000000080)) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:50 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) 03:41:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000007b80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/254, 0xfe}, {&(0x7f00000003c0)=""/235, 0xeb}, {&(0x7f0000000100)=""/112, 0x70}, {&(0x7f00000004c0)=""/34, 0x22}, {&(0x7f0000000500)=""/228, 0xe4}], 0x5, &(0x7f0000000680)=""/240, 0xf0}, 0x4}, {{&(0x7f0000000780)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002880)=[{&(0x7f0000000800)=""/48, 0x30}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x4}, 0x59c7}, {{&(0x7f00000028c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002940)=""/195, 0xc3}, {&(0x7f0000002a40)=""/165, 0xa5}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x3, &(0x7f0000003b40)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f0000004b40)=""/1, 0x1}, {&(0x7f0000004b80)=""/54, 0x36}, {&(0x7f0000004bc0)=""/106, 0x6a}, {&(0x7f0000004c40)=""/87, 0x57}], 0x4, &(0x7f0000004d00)=""/121, 0x79}, 0x8146}, {{0x0, 0x0, &(0x7f0000005040)=[{&(0x7f0000004d80)=""/255, 0xff}, {&(0x7f0000004e80)=""/178, 0xb2}, {&(0x7f0000004f40)=""/4, 0x4}, {&(0x7f0000004f80)=""/170, 0xaa}], 0x4, &(0x7f0000005080)=""/118, 0x76}, 0x6}, {{&(0x7f0000005100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000005180)}, 0x6}, {{&(0x7f00000051c0)=@rc, 0x80, &(0x7f0000005340)=[{&(0x7f0000005240)=""/231, 0xe7}], 0x1, &(0x7f0000005380)=""/4096, 0x1000}, 0x9}, {{0x0, 0x0, &(0x7f00000073c0)=[{&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000007380)=""/37, 0x25}], 0x2}, 0x3}, {{&(0x7f0000007400)=@nfc, 0x80, &(0x7f0000007840)=[{&(0x7f0000007480)=""/227, 0xe3}, {&(0x7f0000007580)=""/247, 0xf7}, {&(0x7f0000007680)=""/168, 0xa8}, {&(0x7f0000007740)=""/217, 0xd9}], 0x4, &(0x7f0000007880)=""/176, 0xb0}, 0x2}, {{&(0x7f0000007940)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000007ac0)=[{&(0x7f00000079c0)=""/209, 0xd1}], 0x1, &(0x7f0000007b00)=""/96, 0x60}, 0x5}], 0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007e00)={'sit0\x00', r1}) inotify_init1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000840)={0x33, @broadcast, 0x4e22, 0x4, 'ovf\x00', 0x20, 0x54, 0x77}, 0x2c) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) sched_setaffinity(r3, 0x8, &(0x7f00000000c0)=0x1) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:50 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLINK(r0, &(0x7f00000003c0)={0x7, 0x47, 0x1}, 0x7) r1 = dup(0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x800) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000340)=0xff, 0x3c3) 03:41:50 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:50 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x30, r2, 0xed6ec2dc26082945, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) clone(0x4010000, &(0x7f0000000080)="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", &(0x7f0000000000), &(0x7f0000001080), &(0x7f00000010c0)="3f5d1a84542d4e29a1a1cd755731e9629dfec2b8e7748f3cdf44e9efa48261101d91ee838d0087ab38a5a990e127580cc1f7") getpeername(r1, 0x0, 0x0) 03:41:50 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@random="e5c1a2e67983", @remote, [{[{0x9100, 0xe48, 0x1000, 0x3}], {0x8100, 0x1, 0x9, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:50 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000080)={@empty, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={r1, @broadcast, @rand_addr=0x9}, 0xc) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x32) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) sched_getaffinity(r2, 0x8, &(0x7f0000000000)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 03:41:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r1, 0x0, 0x0) r2 = socket(0x0, 0xf, 0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000003740)=[{0x0}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000000440)=""/149, 0x95}, {&(0x7f0000003540)=""/141, 0x8d}, {&(0x7f0000003600)=""/35, 0x23}, {&(0x7f0000003640)=""/220, 0xdc}], 0x7, 0x0) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000200)=[0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01]) setregid(r4, r5) epoll_pwait(r1, &(0x7f0000004e00)=[{}, {}, {}, {}, {}, {}, {}], 0x302, 0x3, &(0x7f0000003840)={0x7}, 0x8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88c, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) io_setup(0x7f, &(0x7f0000000540)) getpid() sendmsg$key(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x20008001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000500)={0x0, 'ip0\x00', 0x2}, 0x18) unshare(0x40000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)={0x40080000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x70, 0x0, 0x100000001, 0x43f, 0x4, 0x0, 0x8000000000000000, 0x80008, 0x0, 0x2, 0x2, 0x9, 0x80000000, 0x0, 0xfffffffffffffff7, 0x7fffffff, 0x3, 0x8, 0x7fff, 0xea, 0xd41, 0x1, 0xffff, 0x100000000, 0x7, 0x0, 0x80000000, 0x0, 0xee, 0x2, 0x6bc93c61, 0x8, 0x4, 0x84, 0x8, 0x849, 0xa5d, 0x0, 0x80000000, 0x0, @perf_bp={0x0, 0x4}, 0x100, 0x81, 0x3, 0x0, 0x6, 0x3581033f, 0x6}, 0xffffffffffffffff, 0xf, r2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0xa35) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) 03:41:51 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x7c64d5f3ffadf58, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000100)=0x14, 0x800) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x40000, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000003c0)=0x1c, 0x800) setsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000400)=0x9, 0x4) r3 = dup2(r0, r1) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000040)) times(&(0x7f0000000000)) 03:41:51 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0xd3956d8a7528dc11, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e24, @loopback}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$cgroup_type(r0, &(0x7f00000003c0)='threaded\x00', 0x9) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:tmpfs_t:s0\x00', 0x1d, 0x2) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)={0x7, {{0xa, 0x4e21, 0x1ff, @mcast2, 0x101}}, 0x1, 0x3, [{{0xa, 0x4e24, 0x5, @empty, 0x5}}, {{0xa, 0x4e21, 0x0, @mcast1, 0xffff}}, {{0xa, 0x4e23, 0xffffffffffffff00, @empty, 0x8}}]}, 0x210) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:51 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) exit_group(0xfffffffffffffff9) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) 03:41:51 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000200)=0x54) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f0000000140), &(0x7f0000000180)=0x4) 03:41:53 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) 03:41:53 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000080)=0x1c, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) 03:41:53 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x501000, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x8, 0xd, 0x9, 0x6, 0x5, 0x7fffffff, 0x1, 0xf0, 0xffffffffffffffff}) 03:41:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) 03:41:53 executing program 0: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') fcntl$notify(r0, 0x402, 0x10) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:53 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:53 executing program 1: lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) keyctl$set_reqkey_keyring(0xe, 0x1) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000580)={0xffffffffffffffff, 0x0, &(0x7f0000000480)=""/232}, 0x18) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xa, @remote, @remote, @broadcast, @empty}}}}, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000000)={@broadcast, @local, [{[], {0x8100, 0x1062bcab, 0x3, 0x3}}], {@canfd={0xd, {{0x2, 0x7, 0x5, 0x519}, 0x4, 0x2, 0x0, 0x0, "995bf5ae81bbb4dd68a035146d4e38fbf0968b64c3da2f5ef733eb1230010c0b2cee0f4e99b666887eb8c96d43fcab9701ce2a7b691b8d4122e483535b7fa14b"}}}}, &(0x7f0000000080)={0x1, 0x4, [0x12, 0x6f6, 0x18e, 0x55d]}) 03:41:53 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c1b4e6aaaaaa2504efc493aabb080045000020000000fc0002907800000000e0000001118c8c78000000"], 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x41) ioctl$TIOCNOTTY(r0, 0x5422) 03:41:53 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x30441, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) r7 = getegid() sendmsg$unix(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="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", 0xfb}], 0x1, &(0x7f0000000500)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x90, 0x4000004}, 0x1) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(r0, 0x402, 0x19) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x40000, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYRES16=r0], 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e24, @empty}}) 03:41:54 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x25) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(0xffffffffffffffff, 0x0, 0x0) [ 2220.006062] kauditd_printk_skb: 58 callbacks suppressed [ 2220.006072] audit: type=1400 audit(2000000515.200:62765): avc: denied { map } for pid=13397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.034979] audit: type=1400 audit(2000000515.200:62766): avc: denied { map } for pid=13397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.059940] audit: type=1400 audit(2000000515.210:62767): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.084108] audit: type=1400 audit(2000000515.210:62768): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.111899] audit: type=1400 audit(2000000515.210:62769): avc: denied { map } for pid=13397 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.135896] audit: type=1400 audit(2000000515.220:62770): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.161362] audit: type=1400 audit(2000000515.220:62771): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.186024] audit: type=1400 audit(2000000515.230:62772): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.210261] audit: type=1400 audit(2000000515.230:62773): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2220.234517] audit: type=1400 audit(2000000515.240:62774): avc: denied { map } for pid=13397 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:57 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) close(r3) 03:41:57 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) 03:41:57 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x412901, 0x0) 03:41:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x8, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x1) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000080)=0x1000000ca) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:41:57 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$cont(0x1f, r0, 0x1, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:57 executing program 0: inotify_init1(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:41:57 executing program 1: syz_emit_ethernet(0x5b, &(0x7f0000000300)={@random="e5c1a2e67983", @remote, [], {@ipx={0x8137, {0xffff, 0x4d, 0x9, 0x14, {@random=0x100000000, @current, 0x6}, {@random=0x8000000000000000, @random="286f18afa9da"}, "ef2cadeeda056da850bf4e6d4be7b159756e604542e540e5fead74dc8b4dfa47beef839e4b7db4a4cf88221be68c46"}}}}, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x18, 0x3}, 0x7fff}}, 0x18) 03:41:57 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb080045000020000000000002907800000000e0000001110090780000000000e00008ea0a9ff6860e860d9949784ad42cc02d384e270fabb8a237d86458f5989d3976f708fe17fcc9c7a51f6e6dba843ea4f6dc4bcf3f626b18788f59f908a828f48d842422993fe3aaef94dff7c880c0bd8553de61566c58a20404e05ae0160d583c1a6ae77f0f86d53cdcafafd815db8fdf42df99ce28b4f1246b161624de6432cc8942b22169c91ad6ba6392b9ef299f730f547d868c"], 0x0) 03:41:57 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) 03:41:57 executing program 1: syz_emit_ethernet(0xfffffdcc, &(0x7f0000000300)={@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [{[], {0x8100, 0x9, 0xc8df}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getenv(0x4201, r0, 0x6, &(0x7f0000000080)) gettid() 03:41:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+', 0x4010000000}, 0x28, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000540)=[@timestamp], 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0x5}, 0x28, 0x3) write$P9_RREAD(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2144909ab0230000007501b9312a9504bcb2caf0815f20cc60f5f398b90bd1086968da7c0d29a9d040e9ff3cda0825bec31e4811e9f8657c"], 0x23) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000500)={0x200, 0x2}) listxattr(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)=""/221, 0xdd) creat(&(0x7f0000000180)='./file0\x00', 0x0) 03:41:57 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setsig(0x4203, r0, 0x6, &(0x7f0000000080)={0x39, 0x5, 0x40}) 03:42:00 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:42:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4400, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000040)=""/124, &(0x7f00000000c0)=0x7c) syz_emit_ethernet(0xea, &(0x7f0000000100)={@random="301e4c168f5a", @broadcast, [{[], {0x8100, 0x4, 0x6}}], {@generic={0x6, "c243e23391732f98486b079785567d08731c81a8e91bdfd26a1e76620e13ef89e6a86d1fc5fc1c8bc1ff03682f935b446a0cc00d0e5f8efa2edc31da3727ad7cba1be222e9773cd543d71040bd8990eefc4ea5f0c8d2653be829c259eac494682c0dc92e3c0a1bdd9aadd9d027a7724e22c726197475e6024d59e11ad94f19dd842964158b66d1220421d4f670d3e50b68f89470d774cfbf765a39a0582c1a02e9eadc52713360fe251699c49a79428489a74dac7e584ce1fae98ba0745fec8f47efc0c15297fdf79da917c66532be2098a197caff784063"}}}, &(0x7f0000000200)={0x0, 0x2, [0x429, 0xbd5, 0x93d, 0x2f3]}) syz_emit_ethernet(0x163, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) 03:42:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000), 0x265, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x154, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x140, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8538}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5c1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}]}]}, 0x154}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0xffffffffffffff98) syncfs(r0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 03:42:00 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0\x00', 0x104) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x3, 0xef, [], 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f0000000140)=""/239}, &(0x7f00000002c0)=0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0xe0080, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000300)={0x9, 0x1f, 0x9, 0x6, 0x1a, 0x80000001, 0xfc9b, 0x8, 0x80, 0xe68}) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)=0x14b) getpeername(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x2, 0x6, 0x6, 0x1, 0x5, 0x100000000000000, 0x3091, 0x7, 0x6e47}}, 0x43) 03:42:00 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000200)='bdev\x17vboxnet0posix_acl_access{,nodev\x00', 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r2, 0x800, 0x3ff}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha1-ssse3\x00'}}, &(0x7f0000000300)="31fbdfd30f51c43c250b30e70a392537af3016697affb2e94af6f247c1cd079c55d184692ee2113688985015462cfc7452865b1c6aa1a6e12f8d6618cb420a93b2235b3637f21f3dad9fc05b76cccd634b15c2f18f8ec68a312adc80ceafc065ecd8dad13d88efe9", &(0x7f0000000380)=""/59) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) io_setup(0x3, &(0x7f0000000000)=0x0) io_getevents(r3, 0x2, 0x4, &(0x7f0000000440)=[{}, {}, {}, {}], &(0x7f0000000180)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:42:00 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) syz_emit_ethernet(0x115, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x0, 0x3, [0x975, 0xb9, 0x5a5, 0x36a]}) 03:42:00 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 03:42:00 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x97, &(0x7f0000000000)="929bcb6ff35b1d23c66156676e7a244733a51b4458099e1af6a653c014b425") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:42:00 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000580)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb080045000020000000000000080000000000e0000001110090780000080000e0000874936bded441fc660e1c4cb1af22a4c14a3c9184dd3dbef8a0d21e763dc52ac055d191bfa943193fc128d964dc6e3ae75c900b10cde197520bfc396e8c8d39c1d8477f1bd625ae04ce4cf603c82af35e599a6fcb2f41a6a526fdf49c7a29803ea33c40c5fd0d758d5baec831936cffb476d1422c413332bb4c2799b20be76d5f0f774b3e947ad9c0a443e2f4b4a4e734ae19768b05ffbf6895c747571df0be6904f02de3003b2ba7433a023ad65cac9d8d79214b81341afdb644e69c2a4fa2af7ba514501ed46c4f91d7aa9a6c89cd724df6065a5b6720dd3e2c71d96a1fbb7886de2f6d661f862b44f6098bfb00074f0526987b1a663ea18d8c5adebc91fe3907ee94d69aaaff59ee2ed64752361cc085713e784c14fcfb9ebd8fec4f01000000b467a02db55cdc7b8e19e886812416366deaf259cc8950451cc4939ba2ad4d8250a520ce79408c07a3829f4bc7329aca901994197b46e6eb000000000000f511e02c05d7bdab56e880543ff201690af71bbc2f5a77a753d83f77bbf5d539aa88405c246c8d8f91e29c3d1327338e38fb91b5866783b5c4c9ff78b8a452ba1910c50cee04c6911fd707c545351aafc7088bf52f7fa7eaa9124de6c32868af8c12310520676429d389c0c0d178466a29d3edb753742c482b9a60cb49ed9a8c5d9a841c1cf7d239132527b21ea263807b4f517494452e664ed1"], 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) r2 = dup3(r0, r0, 0x0) sendto$packet(r2, &(0x7f00000007c0)="11709a7a0548df28b6809b2632e6397ab39cb426a4fb86f10bcdff12902b6f29f957c644c7aa8d80fb4dfd3fe27defd2d901dd6e1cf8931fd54f2a8ca1678d445191029158151a238d89fa580d1f327d4783ce13aaffc175c9c80f9a8943f2064551b0cd94bc4741941cf9d960efccc4f81cf9e29ec76328caaa3d0708bd6ae588117fdd80cf690538f0937b8b2bf2bf744920015070d9706e38d5ee6b615c2b15be3ad7f74977d16122d013896866f13b73655b666ec5140ac4754f4054c9d59ccee10afc74bf1c883a4a217abf24b69dc5a1543594a01e3ad9acf537072214ee80c067178ec15db4f969e60f6361b905b82f72dee296ed2b925520527db35de1de198633a97e5fbdad7785bee3f7b438a5bf1eff4855a9f4017e604b86f1ae61087581cf2c1bebefd636abaf45329ed601825aee8e17b10b5664ccd8749979d7ca090c7ca81a576ce07e145293a2b68c957b8aeb0f8c22729fbfe6f2c943e2e29b665bd8e7a4ee4626fc5e8d2323614508f44424a7cea2e50774258316043a07c48aa4f36df79284dd0b178da98c5c9d5237fa2d13425ee615b7ccc2cde0e7d1557626d90d1c2f58ee8c14e06dca6723307a69326ef0cba9a09a8c095ea1107a7bcf8ac7f3fe57f6a701897674e202d02d8468717f2a83e687b202c5cc7a3ec663d28f58fb25c0f5419ef22b51b7e91d7976f0e6be796b7002df2d0f7713eecc37be50da420b6976ec52279898e7dd30cf966dfb60f1a9f91e79c0735970554ebcc1dc15d18168ce1bb39d02af066dfeb27c0ac7fd936abc55c1258290f142597f0ab53e9e7b1c4fb018ba3dff9210e2984d0f749223d1f15396ac5807b4b427270f80d2ca3743a30dc6f2cd2b44f77e97c10a575ed8afbc45388d89fc4c1db80b4dbceeb228c9efe34757a273e9dd3ce532a69c868dcce2ae69ac7f1aeedeed9fe3900f4837d0e8e16ec4ecf54a276a9f6920269a83e6f867881657d37310b8d3fe0f267ab085e7a37afa7bd5239a2c745e6e512b1cc90133ae0946e15a6b14500b0437da85637479033d2eb78bef88e7642300326b94f8ca300953877dcda857516d3a5e90da8d4115699575694e61329224be9f57162deb3b937b626e84ab12d992e1bb7d79e3443ff380980f0e1bf010f770b6f0bc417b10eaa524c3f4edbf199499885b4763263bd189e44af7fb89f1e997d58ba7afa4d06b37f15c74effb1f81b9f2f1e07e69d9549050bcec59e7460ec927732b44226d1278bedaa5fff41990377349c886f2f0e8d2bc9b231f3a663b4a0563332053b01fcb3cecc0a845f1af4eb7ddf9ac61c3bc3f21d17a73682ace9f9c6baa6fa7c7618e30d72dc2d0fb4108ca89c90cf5c6153a7b34b918ac1722b7f41c958d5cc8fd1180102b5eb71851dc48bda0a60c4b3bb3d33ef7bd4b4b39187a386c782c46c60b0e9e5c44fe0d3d311d62c48285de11761eefa0fe23c083dc2b293a7b28cd1ec83786e3ca31bd5a18bdf64dbd2f74b2075d643eb12f7a4b120b3e6301964704c0fad7d571ed7f69f29677e5fee06d3b3c5c0ee06d64af005212f3cc4943544a499cd2172eb9d9cb2ca33e019301cb69031fce8d4485681be2ab9cebfff8294dad00a60ba91bc35ce04b904246f8bf70c17e2bd9587cfee08ecbdd061e48177379c3fef5a229f0a5d9c622b2e4390eee1e5e4dce59f55566417188cf4c420d1cc4f3d6f9a283e9fd99d7df0eb83699958dd22756c484db53a0e17a450f45824f128798ecc5666906d4e0be0b79d4b36b70fb5d4c10915db5d86a14a04f10b9ca56a1b12c96a1dc5b814f4a214ee6f032bb563609fcae1f34d8b4035b2c0b9b36e4ea2ea774fc32e6fd8cb011ddf52349f4ecd2b35728a00e853486f8806b39bb9461c9788fbd34b225986eb3dd04d375bc4be95fbdd611809b5d2a6faf2fe9c0c3b929b738bed1e95fe3ec810d5fade9c0b2ea3449c0de986b83b96cedcf9547cb71a47aa01e184ad65f247f2f3eecaae6bd0ec1fbb9123312d107d2bd56e364958573199872109769ea12412d591aa057c4bafa7e9412887a656dd157b4a445df7ad33cca78770e583352073826979d6d80e02fe0e891b3250c032330254912536778274ade1413c6eaaa0138002e550cadaab8272ba1b40b3813df5f29f47fa75dbc06920240ac6cb563c10113cdf8ec271c2495c1707cf7ecf9bac816477e639283f8d9f7f028ff617e1050f221d6b118a447548b1ee9db19223e6da5f335ca0517306a70797c5742d52d05cca7ec8fd25886c4daf64c2d5e05e7df23cadf835ba82e5ecb13429dfd22adf58e4060dfb25a28daf941ae15891d68aada7e76214795b465071af65662d0769c62819ca42fb055aa1a692a5615c326157643aca5bd9380af7a2304ca8ab606b22a9220c1a365e07d477263aa5db65c8481a4633d2adbe8b4585f3e2bb86601d3231ea865ad0817c2329459b9f51f51ff6273459e138b894ba34572feb54f491cef960a907f41d0a349bea2dea3f1c84a5073a7180aa24de117d07b7a2eeaf8186d1712ddf42b15fbe768821df485b0040f3091ecc221bea77ebe0953d6fab1f162abd4518ae8487db54a90097aa78d55d342335d4a0469adbd91f3c999259b1320116330275228c1c82551e66ce3253dbe96fe8e40feef27a035779b777f53ced0568635b964a4dc7dffecf6a1584eb891c4244b0d59ce240cdf3f3ac59afa5dcd247362f3faeddc05169f2bdc5a51e2d51d15fe6da84012decd8fc2c4c8a02be9eb00f88e1d5056c0fbbf62f5f965359ceb55d9eb5b9e9f4f31d24696dec3bc326b6515275e25a892f0cbc1e42553d0686ae91a0927a836da7c6ab8de754e8feb0c5902add586435dd7584305870da0ff542b8f0398d942b4e1278cf1e41f2264f1cb6cd30520e1f49f4ae1e70042acbdb3f78db131f58e72f6c1b670fbbdd69bad9e11cdf201a73932e41556fa2ad73a74fe3cc9b1332691c8107bb47bdf8d84284ee108022b954f719d2bdd7884c507a0b8c0ec2de42a027492074a2ee5380ab78325aa6593b1981c2d6495324869164fb918b9b23e9ccda5ff4e74b1a941d967753def55ae5a43f6bb585c0407a05102ee787a24655d56826de2000a5f1d8ac1ace857f46c1b092afaeec7aca8c4f6c86f5ba0bd7b1b690298bc84a2eff375fdca0734133597e1fd465b64ff899e3ba88dacabdcc42dc389462d925bc1b552050f19cb5fd1c39f04d27f7c048bc4d397b116952d84016662a2e2fa0c3a38322016cff5e41621b5188b84424e69a0c7c72ef648bcb9794132cb0347e8d366cb6618a495c9f32822ccafb6d5c1fb1f49e04cb29d563da5ecac309a65a0171a6e45057e7d99557de533a7b46d7cc530012b41598355e44366cbebcb16d591f1dd1a7eadec0229cc938492868cfb32f5699ca44547690c1270a170045e4723ab14eba04301012ff3e75eaf79f502077d830dc5bf4159026bec36c0547df81828b1b43316cba2e62d82a769dac525481eb48850ede6471c0d5180c6726e1b7b781a7cfe29bf459af91b56f93a15d35b80b89a48d8610238427720380cf55e5d56c3ae0a81a798b9ca4362b42388e33e96d368037dc10c72af902fc797481c3074b0d38f4034e68345fd25c597dc6041d62388fa012a93846553875f2263060a9b0c2cdd56556d654b690cf4af289bb93bd0b48022cc3effcda48d848e2b2351e62ca3e3f98724999b7d44f036227241176f99d4091657db095e0cc098988c9f2a21cd98155ea436d8e3b1acd3cb59824fa4d5a72fdfe2909cc2543a02824ad1cea307ad71384811464454b7c7fe891f5d20132869f53528c1bcf7d963f5d58f8ba6d2eecdc26def51dd89629ecd01be1fc96a751f44afcce8a215afb409ab5e52d537aefa527af8b42a7ee45ba4b78491c7d395b7dcfee1679f1aa46debbf1434e82dd7382d0f5c7b3932799511fdffae59b12785a50cf60f4cb144b52ee701c85880505a712e277bda8b1d8f44f0e1263d202e30fdaf01ed4796e24a39cb53b7d3ee8f2e15602b65639ae2c321eca446449ad98832199a28d4b039870bea500b40e0cd4c829e019ed2770c0193b6e8247edeb979260b2500fd1f26ea425caa74378569caed2c789122e99102e7022d66f24fc3e0d1171d770aaeb5f3bc9fbf4db5bd793df8d20ab368720b0fc37e6a1bafefb94bc775eefef375ee1c6715a48da22591a5034ab20ef463ac46e0bb0591b7e82c7223a6b1561cc95578745ff39c39471862216e7c606c349b3caf3ba0c8ee797df5645f8d68559a8243a3c762997c681796b90cf1c8c54f93996ff23c9842aded1992307b48b2f987f78d2926b0638dc8f2278b3979b7b68b0ada7606b550a86d37a18e3c78fca0fd8caabf69fba33c4aee7597a91c4340d0f81d954c0b521bc7f0304da2a2869ba6d8217e4367f44f1b8021ebe4de8a89d4c26b49802473445d8f58f44e92ce990f541ec32b99f80e1eee5fa9502326c2b6024a8432cefc3187935e7292cb18810cf408f29d3992cfa5184e36638784ff5ede8e75da900236e0467cf7a0af40ed003633156596be92e8406f61116b42e3ab108fa92c1427772fa8fddf54101bb4fb44d27fe5265f4ffd8a16597e9408c89d21d1f7ae9871e176f744b20a3fb4a6371e86810a43cf9cebb53d76a5d2bd0c6281cdc22582ada4d20dcbe2cdadc09eb3886eff7ee26b317baf87828159d2159854f94c49ef1bd8ac0da2f473dc8e666a95b639c9dbedffa3c0b29a4267f7e0fba2432f5031cf38f326ec57fe4836e7aebbb732c934392a54f4ff8dc9dbd4ff30b8d5212d9d191bd4c08c17fa318fcf3e02aa6c12d8a5c39fcfbe7f70281eeb295345ffea69ba263e1c9e609698b9080df0ce9e3b05bd8c5f9cf389d7f565fa442de1ad38e2d36b58d832e95f3738be8669c8df801b70d08262e47e9672274dee93ed1c39e374780b0e4c95620e8a69ceed6d3a1e639990421dd5757076faacb7e34600e6d776222fcfa234d18942bdbc59c091456356eb1f6fca4f6673b1bfb6fb9df09cb93289e7b22b2b749947ac29c9977150c8a83f4ad5577df0c2106ce59343749135ca97a39e5638d89e22278e0db3ece98336333bce7b1e54e0102aa219d15601b8556af4081f3f0298017a249f6aa5c9cd99e7ceac33de20c398ca811eaef3cb0ce22743e6247bd67cd55bf6bee1fbd1902ae20dfb4bc690b2e71ad91979b022638112fb415dfaf86cc81c78d313affb8da50415b4b3477dd9d989002a851aaa8e21847c90ea962b5d900cd266ac25152c31eeec79c317c7e9c10c80f2b34904f460ce5fdb573311640c36a20c5619b531f193666ab79db888d1416c19719f091a952124a08f674188f806a1c0d5e43a78a71b3b7d0605bb5689a09c4bcf9b21479a36329b666bfea761b1f6ea1002875b4c1bca56143c97b67df2bdb873c485773fd8e748b4ac8e0b770cb1b813299af085c821b9f8d5cde167c049600461855b64ac2b8081865d09874749289adb9ad1544020327ec512c0a464fbf1618f2877726cf49a8e008be1624b53f01e2cd5363d5dd7cb69a6d4a8916eb0f00a2aeaed69d7efaff0bfa21f1851b08f52428c106224d3addba061f04dc4bebb0364e0cac6982a020cb290b3c18745b85d4f4fe4b875797c1db471005dc0c4a887d9c32f4805af7891be4856b8ff0f2a5ec522a9b8ff9d1e5bc75b2f50368ae70c41826f5830af05cb4d367191df323ab8ada5c6a6f4be182a665ca7833c34836e0dc60ee4fff36e67653d", 0x1000, 0x40, &(0x7f0000000400)={0x11, 0xf5, r1, 0x1, 0x3, 0x6, @remote}, 0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={r1, @dev={0xac, 0x14, 0x14, 0x29}, @multicast2}, 0xc) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='.{\x00', 0x3, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000300)=@buf={0xfe, &(0x7f0000000200)="e7a61b261065f6314c0119f82a7679bec5a3a53d898be6522a604e5db0e1f0ec8e8082518e31a50e1c44204af03f0fb0c0ae76361b106706d01878a94b01c586cd84e87fb16d047015a2f97c2f4daa978124748ad85aa874c9d6afb23d3f8cb67b90264236c367b0c5b0a3164942f7dd9e08b5b3ff17934e8484420ccacb4bfec425530a75e654d9cda8881f64fecb68ab9db5072fad072b94a9c66c238a5b17cf99911c8904f1072e0e8b22c34c0b2eeac6f23b294743e98859b677084e1235eb9abc23b06553e38dc43ca42dd15c344ff39ae06e3fc3a3935713115aa473582ca9b6146e42cb6eaa10ce2f2f5c1260da86a1cff1b7c9257a509373f4e0"}) 03:42:00 executing program 2: r0 = socket(0x100000400000010, 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, r1, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}]}, 0xffffffffffffff3b}, 0x1, 0x0, 0x0, 0x2004c000}, 0x80) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) ioctl(r0, 0x8, &(0x7f0000001a00)="57fb4e198663698d0b8f09686ca44e4656b2b8d7689d0462b719a9d6cf41413eedce60272d54c91c5b2f44fdbd3e55311701e68cf29e1a3c291bc9825a90254cebe8de2ae85cb49cffd3353f056ecf7e7c94676f1638101fabab7a4880f98e252ea2e2f485190c5f50074203d209b127416dae76ee5e0835ad556fea40f16bd5178a0a4bb2da5e0961f300e07780582ac4adba466dcf88b89a3c830ad1f18cb227dd8d65") write(r0, &(0x7f0000000340)="2400000052001f0014f974070109041e020007f607000100010000080800000000000000", 0x24) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0xfffffffffffffe35) sendmmsg(r2, &(0x7f0000001900)=[{{&(0x7f0000000240)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e23, @multicast1}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)="e4b1869adfa829c7ea6d5ca1bd98f62ab9fd30c90350016750892e9b3b511ec59771068452692a4d13063e42d1627a8352aa43bfba3cd925728c32b096a714157c58c63aafa48236f84c87171d543fafab0e47590504ae979df9008ee7b59579640102705ee56ad92418a7388b4cddbf589f3d2dcf93651fe51372c0c0a8007c33fc717622ff99f982f840d2e972e06d792aca961073385683922a808c79380e02d858a519f14d63935efa5fe95e74b352897ecf1b004bc4e49587be117db40f08bb68e1ef4f93b4433e893ac05a42797f14bb1e245f710ac4e3e7d8ca08201777aae9fc", 0xe4}, {&(0x7f0000000480)="3d6360a7f4ec7701585ccb150142eff7a97c3e0286725da9d0536400f6253338828e4a14aae3b88196d4c537c0dc6cb53cd6c1e3b6bd51bb5502801ce094070b55e5937e762223c73da3f9bc174ccb3e473c9a0cdcde4003a337e3d347d98bfd648363c68e5e1618169fae5cf2564de51f52affae3323ee97e1d57c9867073efbc7e3fa06762fd16f2c8c255c16b8e3d3061295dc4486a1ab245d012ccfa", 0x9e}, {&(0x7f00000002c0)="e9074a6fb2381f110041ac09539072c38a1acb5a75dd10a1f95a81eff138109cfcd2641d0c6e55e76e953960f6eea34508bc17b543e4b1dd14b4f1479d0a586d27faf34dc428400bdd0f924b28359f33a8d7c76d011531a2df321471141f79b365c9a9a7d11e295b190976a90fe3da1ee1fb00a7e21236e8b5f145d53de96bd6", 0x80}, {&(0x7f0000000540)="df93e06fc13afcb81a70a529d6cdbb0964b7f04787255d5fc9cb2762d161e61e774ccc591711bf041a74c7ff07caa8670e6d09e008ef362493aa272967f4348970382ca446b44a8ccd94dade098741074f005afbfcc826493c9a7f15d08cae50b77c2968a27b4d21ccd772", 0x6b}, {&(0x7f00000005c0)="addadbb980c3ae64ce46a82a95dc5136a06b2e26c3ed6c5c8890cd08d465070c1bb8e117c64d9c6ac67c5caed6c66a0f1232e8afb58dbcaf40b386f3a0d0ae95fc614bd3a2", 0x45}], 0x5, &(0x7f00000006c0)=[{0xb8, 0x103, 0x80000000, "0220a4097d51e2c0da032a3d8199bbb4f5c5a574074e86b54bc22f222ce9a9b1e0e183aaccaac925e54d75fc46904936200a2c2c3371af8f9b5d476e7ddb5bea0656c6897234c161d588ae506b475f7c5d47ef787da3dea769035a6c1556f6cabef96ac79ce07b83293c3226b549bfe87f6de3d1c1fabb309812046367729d54856f613dd304386782a1d0a6a6f7bafccee1fdf8abb440b200cc5c6c539beceb0782"}, {0xa8, 0xa9, 0x7, "70640e08387e6b23982eb6d3e3c7c0d2c423fdff81bd66a720e6937368dc19eb437d496f2a66245030d06a590538e96bd3aa16f72fddec4ac7b9d2a994f5181a0af665279833aa1378c724fae25c4eed3664c348ea94af7b3e317226839129f1bb743e0c1dd2eada901ddd016f831445cc096ded15d7a6b6b457d945be86ba3df7431f8ef0837c054e99bb5df6e971cfaaae"}, {0x1010, 0x196, 0x20, "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"}, {0xd0, 0x119, 0x5, "9d9d964611de2560170d66f10d85e18eb82b0c42dc9b76857458c401e9d953a67d84b32c3bd33554668de72b5b9c32a15b2444b4277b7af75b89a7f0b1fb1a7114a585f9d8e72c9d51c957ed7606cb3efd8367512f940cff114aaba96615e6769346e91efb49f70dde8aca7bd7279bda688b91451fc0239cc2c1d9a0cbd3f1f7fd94fe7fd37b6dea6d775ec31982f5d33d7da6c054910b24814cf3f511d656504e110bc31d5071d98087177f17164c4eeb4c650e7d5dae62d0eabbbb"}], 0x1240}, 0x4}], 0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_int(r2, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000001940)={0xa, 0x4e24, 0x0, @loopback, 0x1}, 0x1c) sendfile(r0, r2, &(0x7f0000001980), 0x200) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$TIOCNXCL(r3, 0x540d) 03:42:01 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) syz_emit_ethernet(0x94, &(0x7f0000000000)={@empty, @dev={[], 0x1d}, [{[{0x9100, 0x2, 0x2750, 0x2}], {0x8100, 0x0, 0x8000000000000000}}], {@ipv4={0x800, {{0x10, 0x4, 0x2, 0x1, 0x7e, 0x68, 0x91d8, 0x4, 0x16, 0x0, @local, @multicast1, {[@lsrr={0x83, 0x1f, 0x0, [@dev={0xac, 0x14, 0x14, 0x22}, @dev={0xac, 0x14, 0x14, 0x13}, @remote, @local, @multicast2, @broadcast, @broadcast]}, @noop, @generic={0x1, 0xc, "2fa4963de9c769e43f26"}]}}, @igmp={0x13, 0x480000, 0x0, @loopback, "81d53ea48e23e652d4ead27d66b9b3c5e500ececed4a44a4b2238f43ad487b01370390b3eb8672d714757f7a7dc411f5d5e7d01b37dc"}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0xa3d, 0xdbc, 0xdf6, 0x9b3]}) [ 2225.759944] kauditd_printk_skb: 35 callbacks suppressed [ 2225.759953] audit: type=1400 audit(2000000520.950:62810): avc: denied { create } for pid=13465 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:01 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x20000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40000, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000040)={0x57, 0x10000, 0x7, {0x100}, {0xffffffff00000000, 0xfffffffffffffffa}, @period={0x5b, 0x100000001, 0x6, 0x8, 0x3, {0x800, 0x4, 0x3ff, 0x100000000}, 0x4, &(0x7f0000000000)=[0x5, 0x101, 0xaa, 0x8]}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2225.847584] audit: type=1400 audit(2000000521.000:62811): avc: denied { write } for pid=13465 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2226.113558] audit: type=1400 audit(2000000521.030:62812): avc: denied { map } for pid=13473 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.186250] audit: type=1400 audit(2000000521.040:62813): avc: denied { map } for pid=13473 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.268901] audit: type=1400 audit(2000000521.090:62814): avc: denied { map } for pid=13473 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.348527] audit: type=1400 audit(2000000521.100:62815): avc: denied { map } for pid=13473 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.402065] audit: type=1400 audit(2000000521.110:62816): avc: denied { map } for pid=13473 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.451406] audit: type=1400 audit(2000000521.110:62817): avc: denied { map } for pid=13473 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.495598] audit: type=1400 audit(2000000521.110:62818): avc: denied { map } for pid=13473 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2226.533459] audit: type=1400 audit(2000000521.120:62819): avc: denied { map } for pid=13473 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:03 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r3, &(0x7f0000000280)=@known='user.syz\x00') creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:42:03 executing program 0: r0 = inotify_init1(0x80000) chroot(&(0x7f0000000040)='./file0\x00') inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x1000000) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c) sendto(r1, &(0x7f00000002c0)="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", 0xfd, 0x4, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xffffffffffffff18}], 0x0, 0x0) 03:42:03 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x2000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@empty, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x7, 0x0, &(0x7f0000000040)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x21) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000001c0)=0x7, 0x4) 03:42:03 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@dev={[], 0x10}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 03:42:03 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) syz_extract_tcp_res(&(0x7f00000001c0), 0x3ff, 0x4800000000000000) syz_emit_ethernet(0x132, &(0x7f0000000000)={@empty, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0xda, 0x0, 0x124, 0x67, 0xffff, 0x1, 0xfb, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, {[@noop]}}, @dccp={{0x4e24, 0x4e20, 0x4, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, "177fc3", 0x2, "62a0ce"}, "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"}}}}}, &(0x7f0000000140)={0x1, 0x4, [0x36a, 0x127, 0x25e, 0xb8c]}) 03:42:03 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r3, 0x20, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) r4 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0xffffffff, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000200)=""/15) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000240)=""/238) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:42:03 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e000081e84d84b2db57b8a0af02ad8c4fda114a6e1200fd51c7ac998963739081ac9863e00c3a144b00263209fd5d31366005e0fba973461c1a98f799e3d94a162efc1763146b22c169c07351b62a1c4bae8590f0bc322d3044fe9dd3e4c4584063a0f35b040fd90300fc409fce43787e45d5627492ffb4cfb282d780c688c3b7986dd839b15e48e2b8930f6dc3bb8490fc3ddc4bbed5116722aa50c9c1288a6d28df4e54bdec1095520dbaf24445a8c903788d8c35162f2f2487f67a18c9c6c7ac1af5dff578d40b6e17c1e9d1aef018d594f3d7ebf1668320566590a043c35a726cadbb9b4bf5ee9d028960fbcaa333c4c8ae0471645de6bc77287666c654fed646b547b12bd5915b9da8d3b3bf44c77ed87a8a96dc2a0d555708993cd0a3ade824cfd54fcd9396f47ebd847f818e5f62dc0585ab785a5"}}}}}, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) 03:42:03 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000140)=ANY=[@ANYBLOB="e5c1a2e67983aaaaaaaaaabb080045000020ca8b3d96000000000002907800000000e0000001110090780000000000e00008ea3a16643e4deb81a72f57c3dc5dd2a40157a800809a02069e35f8bba099385da4aa7daa90397f3ef483aa06a32e9dcf9c6738123d818c7f7ed317c9282c5379327f07311a9f5ac31a1c2e416999f8b9ebc10fb39cff"], 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x8) 03:42:04 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) socketpair(0x1b, 0x6, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f0000000080)={@dev, @initdev, @local}, &(0x7f00000000c0)=0xc) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="b8c361262428172e1cc3d9b3f829f9128a867e8eceb74e3b4cdd853f0e37810ba0444772861b9957cf0d1479ba39dd55fb1ccd5dbf5d8c3edb5da82ee199af8d9b253fed8e9eec2ff3d6e34d2c21cd53a8351ff778f2c586a41015e0002f5fb28e72d94be3eb7eae50015e87ff5f4afbc6153225190a86517e8bd8ba2acb258398d6a92a815b9f418760c39785b57664f52db3a3322d207330726f26f19e18702a8d8fa54c3acdc0278d23449de9ead60784d6a1d9b916f7b11fbc59f64be46d2d442f874c2a36aa8a2ac3e3ae06f5272eea79f85f94fbf16e6d31dc", 0xdc, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000280)={r2, 0x3f, 0x8a5}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'sha384-avx\x00'}}, &(0x7f0000000340)="8e77a7b95fc6f6c5363d59413830290864b84ea1da9a085a9cf66f9c7fabaa6f69fe0a2ff5a06e0c4dd5a6d8969f8242068108fe32bb26639b9260f8e98427635f167ce55f8723acadd4a5c65c61eff5f5067ffe23dbed7b6985661be367088a231ae10b6a77ff6baa1babea160c01afbfda983b9155ac9e775104343fa01aad23369e8c6d2fc9775a7da13b511ba6fd2906213a24594bb13bb99eb09b68ff928ea3c6698f669da562db29919135562185e25966e309ee88b497da572699d6221a8d03bb1e42159bb53f1d0ea842cf92eda3c72ae7d896950bd29415b75b461f10a4", &(0x7f0000000440)="89495a4a062601bd78207548f9c1775ad006fb126b9de863d35ca2f89ba4a6ff597029988e562371fc0c9cb772658849cbd8fc144043b555d8c53cbec4560bf8e02f2ec58319e20fd84e57ee61d9e4a69add17c928230b3611c255e39b30f264cc17f81bcb71b0a38eb9720d8cb62b64e2fbcb1a6cf26e3c7f47e0663abc98aaff94b1dc90aa8f331183cc64d7130a047c0285e938e962395158df35ffe9cfbd9df5f0e5e9d71fcd976f28c19cf1d769c32ae545b73dffc890f603a558e8bbeab1") getpeername(0xffffffffffffffff, 0x0, 0x0) 03:42:04 executing program 1: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', 'md5sum+wlan1{\x00'}) 03:42:04 executing program 3: r0 = dup(0xffffffffffffff9c) ioctl$VT_RELDISP(r0, 0x5605) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x800) sendto$packet(r0, &(0x7f00000000c0)="4d33e5db33f2842a06fc501d8b067b2a3d33f58f64d553ef996298968d68b2762d20a1842459c4d9ffa7882de7fdf69a16999ae2ac7393af58f9afa8eacaa67a2a841570aca8a043eda18cd656fa1021064e1d813a360d7636a7f4a3b06e5c85faa484e10c9cfe2822d743c851049fcafa794ec77d750422759ada64e029511b07a2a0eb19a72ba2fbf2f2247df07b558d7e1d74df3c485e3c247fc3c637bd9a585ed5ac5e6a3c02cf9c7d32df4992fe3db9c9835ceb4e0fb66ba1c29e45fbd58c91629dd0d137a7201f6ddc46f3a633329651aea0a80598671deceddd5bb25c22442995136b8a1e147f129c2b357b8661b1", 0xf2, 0x20000000, &(0x7f00000001c0)={0x11, 0x11, r1, 0x1, 0x5, 0x6, @local}, 0x14) 03:42:04 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2f, 'io'}, {0x2f, 'rdma'}, {0x2b, 'rdma'}, {0x2f, 'io'}, {0x2b, 'memory'}, {0x2f, 'memory'}, {0x2f, 'cpu'}, {0x2b, 'io'}]}, 0x2d) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x32) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xa3) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000140)=0x1d27, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:42:07 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="19a8bde3aedd0146bb89caa82ec0e3", 0xffffffffffffff82, 0xfffffffffffffffb) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x1, @remote, 0x5}, {0xa, 0x4e22, 0x10000, @mcast1, 0x2000000}, 0x4, [0x80000000, 0x6, 0x147, 0x3, 0x1, 0x0, 0x9, 0x7f]}, 0x5c) getpeername(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) 03:42:07 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:42:07 executing program 0: r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = dup(r4) write$P9_RGETATTR(r5, &(0x7f0000000300)={0xa0, 0x19, 0x1, {0x40, {0x2, 0x2}, 0x2, r2, r3, 0xe2, 0x3, 0x9, 0xffffffff, 0x7, 0x9, 0x5, 0x7f5, 0x4, 0x3, 0x5, 0x0, 0x9, 0x80, 0x4}}, 0xa0) setsockopt(r4, 0x8, 0x7, &(0x7f0000000140)="02502d", 0x3) ptrace(0x421f, r1) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x400, 0x0, 0x9}) ioctl$RTC_WIE_ON(r6, 0x700f) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) preadv(r6, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) iopl(0x100) pipe2$9p(&(0x7f00000002c0), 0x84800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='fdinfo/3\x00', r6}, 0x10) 03:42:07 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x68000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000180)={0x1000, 0x9, 0x5a9, 0x938}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'tunl0\x00', {0x2, 0x4e24, @empty}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) clock_getres(0x2, &(0x7f0000000080)) 03:42:07 executing program 3: syz_emit_ethernet(0x9b, &(0x7f0000000280)={@random="e5c1a2e67983", @remote, [], {@generic={0x9afb, "4242693fb3deb66ad33f92506b6d57c1c92d72d117d80415f9d21cd583255ff0948e9aaa712d4e114d5802af8a5cfd1e9f798c01b9c95180bf934a389970802117eeb06ae28921dd3a0dec111dac7d8c3632ed47a48a0f006af68f8177b6317aadb5135cc0699f84d115414e9ed6f226270768f9a0efebe0b722f00179bb2e313a370a49e59f9d40f40f1bd386"}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=""/157, &(0x7f0000000340)=0x9d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x60) syncfs(r1) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x200, &(0x7f0000000080)) 03:42:07 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) 03:42:07 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000300)='/dev/keychord\x00', 0x42, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000340)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) fsetxattr(r1, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000080)='^/,#\x00', 0x5, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000140)=0x10) 03:42:07 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c122e67983aaaaaaaaaabb080045000020000000002002907800000000e0000001110090780000000000e00008"], 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 03:42:07 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x4007, 0x0, &(0x7f0000000040)=0xfffffffffffffc60) getpeername(0xffffffffffffffff, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) [ 2232.195561] kauditd_printk_skb: 90 callbacks suppressed [ 2232.195569] audit: type=1400 audit(2000000527.390:62910): avc: denied { map } for pid=13555 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.314425] audit: type=1400 audit(2000000527.430:62911): avc: denied { map } for pid=13555 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.404231] audit: type=1400 audit(2000000527.440:62912): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r0) [ 2232.481391] audit: type=1400 audit(2000000527.450:62913): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.543947] audit: type=1400 audit(2000000527.480:62914): avc: denied { map } for pid=13555 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.592676] audit: type=1400 audit(2000000527.510:62915): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xc000, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = socket(0x11, 0x2, 0x7) syz_read_part_table(0x10001, 0x5, &(0x7f0000000800)=[{&(0x7f0000000440)="c0832b5ff8d82e4eb984f5421a6b80681fcce0b0b4d3c73b31aca920aa0dfc7bd4ddeb002684d8036959dfa950c41829deed7d4d919d13abe46c0124afd7641b40a9e1a68c7692050c3169eb1661809b421229c50c061354b954ea72e20a83bb30458c4bf02de27046351ff22778219cbf1fa989f15183a1999e44547af3d314600a3b52214d36e422ba17d8af568c27f7f94b7f", 0x94}, {&(0x7f0000000500)="abb8221b21f6e544f0d4c681ad5203a49efc70a90f01076ef395741828167e145a570ccd85c5f8f640185c396a8eab3d347e60aa9eeee3fa8dc2df94fd154a43e581cd3e78509ae5925fc2b7c3587bb45f9bd200ca7b4cefa32cbb3eccf3f0f96f670127a45df6423c29d1ab4941b5bbda20c2599bb43d69ac9b849fef5e5f470fefa51456fcd56428825f6e7ce38664f35d50a7b245e5e1ee56f01f8d28f0adf59fffa0698c26b976196e545dda70261c6e20119e707cdd574589aaed813b8b2d0d2b2fec5fd10c32a5c5ca90f7c0a4f1e567c1ba2a88d7e1fff9167389b90d94af555debd4", 0xe6, 0x8}, {&(0x7f0000000600)="0c80645450b1f455696bc8d66bda6d6aea7a1c9222c9c360ab2ee26b40d197fd38fb613d698e5273c1558a2c2f93e9278a98e2a1be612c3805a0734d9f229837f2ed34f738968507a5e03e", 0x4b}, {&(0x7f0000000680)="4fcc937c44d6197934614f2a0ad997dff756c2853552b69950bd748cd4b7c6134e4f7da6201e646cd759d89a6c0b015780e7d8bb07867a4fd1de5d52b5dc9c5be50f50d243de507a7350fe4e61a23ddd29d7cf472c55f962c2c27bb7d4783c72117fdfc8319c7271b8dfc2abad229f1ec18154406019b4e719378e7587c3bce766042d95b4d1219cdcd62f74d86372767ea5998d944fb83f82c0056d00fb3da0e04ffee2e396981688fe66d8fd80cd69635d59c87e3cd85116f094a7feeab80da413", 0xc2, 0xffffffffffffc56a}, {&(0x7f0000000780)="9c546532f4a2640672d5f3ee7154265152236e4447ed4983b84da07a591204305daa8b091adffdeb57ae29649e22c331d53742aeeb0babe611e133600e9d7a991fd19afe221fa43bcf65f9852acaf5f9117d8baf79dda62c37fa8a2584f63a27bb6bb14bc027b52226d2606ccef0c3838a16b2d7f4a541cc7f71", 0x7a, 0x5}]) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4080}, 0x7, &(0x7f0000000400)={&(0x7f0000000100)={0x24, r2, 0x400, 0x70bd2f, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x4000081) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) [ 2232.665593] audit: type=1400 audit(2000000527.520:62916): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 4: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/netfilter\x00') ioctl$BLKTRACESTART(r1, 0x1274, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) setuid(r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$peekuser(0x3, r0, 0xfffffffffffffffb) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x400000, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='keyring\x00', r4}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000180)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2232.787305] audit: type=1400 audit(2000000527.540:62917): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) r1 = dup2(r0, r0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000080)=0xffffffffffffff75) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getpeername(r0, 0x0, 0x0) [ 2232.863169] audit: type=1400 audit(2000000527.550:62918): avc: denied { map } for pid=13555 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2232.905774] audit: type=1400 audit(2000000527.660:62919): avc: denied { map } for pid=13565 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.728224] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=281 sclass=netlink_xfrm_socket pig=13597 comm=syz-executor.0 [ 2233.762637] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=281 sclass=netlink_xfrm_socket pig=13598 comm=syz-executor.0 03:42:10 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:42:10 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) clone(0x1000000, &(0x7f0000000000)="991d77ef45826731289f304e2edc3470dd316e8930b427bd00fab46cbac542294a801931a45e6d6a079c5d00e5e313b97fc66c703b04fc41704e69cf8461fdbb971c1d0c34af6e917dab494af525a9834959679a52fa5b350f43f31948253eaa923229e4fa68713c4b650d75bdafe02cc9b8319e0b6f6078d84b2ff2603a2db7c244a924ee992dc06fc67c8926fb983d16acdd36340432f08870e03cc8ed9e6f9c2c29de947a53cc0a083df7a41aa648d966d9053cd8c41b316f65a951a320a80cfe31ffc873eefe40d9ba1dab2a898e56e1c9d72650d0", &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)="057356d8ad0e72ded19552418b37707361f8c202c21110c1a1fa2e84444cd5913260c92ba6cfb3a11e0b8f0cd878e4a711e0898942233c8c6f581e9266a32592ff") 03:42:10 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) 03:42:10 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x80400, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x228, 0x70bd25, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000080)) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) write$P9_RREAD(r1, &(0x7f0000000340)={0x7c, 0x75, 0x1, {0x71, "f3d17686d3feb0bf330ce8e969926281a972aebd9e229c4d112f2dc79171d21978db2ed4cb6448cd151e19e2cbab20037437fc6bc123745f828be654fa82b12ebf57ef8cb7284f00d2a450cb98b3946588774fed0243e49ad6d6ff3e0ac134e314c2fdfa1411f5051715956a5802d19ada"}}, 0x7c) accept$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) 03:42:10 executing program 0: inotify_init1(0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000140)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:42:10 executing program 3: r0 = inotify_init() syz_emit_ethernet(0x0, &(0x7f0000000280)=ANY=[], 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth1_to_hsr\x00') 03:42:10 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x31, 0x0, &(0x7f0000000040)) getpeername(r0, 0x0, 0x0) 03:42:10 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x40000, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x1, 0xff, 0x2, 0x6, 0x20, r0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, &(0x7f0000000240), 0x5, &(0x7f0000000280)) tkill(r0, 0x1f) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000140)=0x81, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xfffffffffffffff7, 0x1, 0x0, 0x1, 0x0, 0x3, 0x400, 0x6, 0x1, 0x6, 0x8, 0x238, 0x7, 0x101, 0x8, 0x8, 0xffffffff80000001, 0x5, 0x9, 0x6, 0x9, 0x1, 0x1, 0x3, 0x5, 0x0, 0x100000000, 0x0, 0x9, 0x7f, 0x5, 0x7, 0x8, 0x874, 0x100000001, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0xf1c, 0xed7c000}, 0x8000, 0x6, 0x7ff, 0xf, 0x50, 0x10000, 0x8}, 0x0, 0xe, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) pipe(&(0x7f0000000180)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:42:10 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x430000, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000040)={0x1, 0x5, 0x0, 0x4, 0x1, 0x6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:43:11 executing program 1: syz_emit_ethernet(0x163, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) [ 2296.073331] kauditd_printk_skb: 78 callbacks suppressed [ 2296.073340] audit: type=1400 audit(2000000591.270:62998): avc: denied { map } for pid=13628 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:11 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xfffffffffffffffe) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) 03:43:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) r1 = inotify_init() r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) poll(&(0x7f0000001ec0)=[{r1, 0x1a6}, {r2, 0x200}, {r1, 0x1}, {r0, 0x4fca86a44f4907cc}, {r0, 0x40}, {r2, 0x201}, {r0, 0x200}, {r0, 0x80}, {r0, 0x8090}, {r0, 0x4000}], 0xa, 0x6) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000100)=[{{r3, r4/1000+10000}, 0x2, 0x2, 0x2}, {{}, 0x5, 0x3ff, 0x40}, {{}, 0x17, 0x8, 0x40}, {{}, 0x3, 0x16, 0x5}, {{}, 0x16, 0x2, 0x10000}, {{}, 0x465a56a7b4228f1c, 0x3ff, 0xb7}, {{r5, r6/1000+10000}, 0x9960f561b21c0f9c, 0x414, 0x9}, {{}, 0x1f, 0x3ff, 0x7f}, {{}, 0x12, 0x7, 0x2f1}, {{}, 0x3, 0x200, 0x5}], 0xf0) getpeername(r0, 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000580)={0x57, 0x3ff, 0x0, {0x3, 0x106b}, {0x0, 0x400}, @rumble={0x4f, 0x3}}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001e80)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001b80)=0x0) sendmsg$netlink(r2, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000200)={0x368, 0x1f, 0xd01, 0x70bd28, 0x25dfdbfe, "", [@nested={0xdc, 0x96, [@typed={0x8, 0x6b, @u32=0xfffffffffffffffa}, @generic="915afda0abd1cff95a68bedaac2c5b8d7122b4b7d393e7fded814c94322c14a79b23392300aa46dae7835700bb14036654a1e7e34cc1f4877b89dd976f0c3d4846bf3af8d314909640c0e14c3dc60110a7b0d30cd4b8ba6242a6eb97f159b2c1a551bda00b5a40db8d62fdf3d8f921a05330a0025ef0b3655b32561bca2355be153c285d0c0c5e40b117c70358d53951e0983a96462a421364e660da4b29f74ea558822b5055262c946ec39880ce97c1264ac19854dea7d03e02641999bc270f327a583654f07eeb9911ff81117c2e"]}, @generic="5835cfa50c9911911be46192d7356672e6e6ffbecd023b7bad093a881900fcc5f1", @nested={0x258, 0x3c, [@generic="19ca1e24ab2a79ef", @generic, @typed={0x8, 0x61, @u32=0x7ff}, @generic="cdceb81db8a2a3e9ebac0ea33a5914229f95a484350f436a4473748aae94ded7430844844723d8e956c517330c6ee19b589b38960ab3d7fb097bfcd2da6f9c64945883d04e5d8825f5d51e70b13b7570c8de43ebc87cea60a1fb2fed24989700af26f6dc5dc3e6c42061d7d65295850ff48457ccad8b2d64e17c0baf95e9932a96634ae99a", @generic="296af92dcd1d2fc1db565e9b875e56004eec1284b07fb6d81b1d5399762eae4d117e99600931d92da34c91d6e399c9897eba220b523a238be9d200cefd67a3944cf794e2786fb30a1ba1e6b468f07a1071dc7fbc7b82da55621ce975c2589d3d0f38f5358032e47b0581a0eebba3cc6d3e3c7217cf03b583ba119b020e37ad91615f6bd4172fd7572cf8b46b771c695bee18aa7f7c0d9706b0e473ad979a758709f8fe30851f1f171bf46d83302125f2a875557298cef528f47a7c0a659c0ed49cb44dcbcb35d75b3f4085de5ec0803cdcc868066d9ebdc205fa0a", @generic="a02384a2a576c70b1bef006a3bfa42b165cea76c23cb5dce1f62a764919415f34a675cb5919b46d6a97576d4294cfa41fa9be8fd23b48f0fc41a58cdaf105c2db014a1594652603ee2b3cbf316743aca5f4f50706f4dc5646430486d6fe794f8d5f2e6", @generic="4b0451eb8e41a73a20deffdd2b9221d6f5dd5513e466cbdd020e49fc3bc131a5e90ff09dede2ea8037e8a25fd663169d06bf3449959f3dc7feee1d24a3922df0026914b405cb8dcaa90a5805c73004786e29c1f33b8e8a8ba1de8e4f42edd67881b7894510eb6d8cae935f66ae9a9724072bb688364ffc874e4f45d11c22653697"]}]}, 0x368}, {0xffffffffffffffff}, {&(0x7f00000005c0)={0x1584, 0x2c, 0x30c, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x84, @ipv4=@local}, @nested={0x300, 0x7e, [@generic="bea030393e6977fedffa9c48ecef54e358876b0ae23a3ecdf9a478aa8266ef70066ed4f0057f8cf89bb8788d468d510fd1476bebf83e91d9c2d07438218e7fb02746c1e24a7458b49f3a1c73c25db76ff13a5c6ade2ee74ed92a4184e8ba294825c0eff4259e316a4301523c590f97e94d45e225a0e80cba417c61afe635b4dd6fc41fcee0ecd89526752160c7779bdec59d7f2a", @generic="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", @typed={0x8, 0x4a, @pid=r7}, @generic="ca361f32085b3d3618435f004502c61829c15d669461ebf9face4c79981788aaa7d2b641d6d78c353b5a48", @generic="483e5f163a7e3c9e4d0168675354c13e63e1bc350a8a4f0b8fb90675286905b3e93aa0865b0ceba03a3c985caf5805aa3a430b7275ba31dd29b3f34f4fec176fe91529659620c819e0e25573174e18c2dcfc6798d4cf12c55b876772dd915905e296a72d247d6c5d330a1e2e06435b22a912010a210953b45a65de84eb97db2ec05984f48c042ce2f979abfcb7e37c3bff130d12f36b98636d52219e60f0cfa7e96ff5a99540", @generic="453792b792e1a40d3f7d82389a8b9e5e992d76d045eed7ba8de5ad6b0e9fd4f98bc5d4802281cd77ee294f6002b1c7b2635f5d686fc3a3255b73f0f70e262df96ea05b45b23c9f115d0177073f8c3449f8b33c4aae287f4d3d881696d610b6c464cb62d069ff041de41d25b4baa962934a886e02df860fdd07de17488872", @typed={0x14, 0x25, @ipv6=@mcast2}]}, @nested={0x1264, 0x1b, [@generic="bdde3d517ba8e2b0438d121d84e5bdca8d0717312b6d22b89fcc59157c7ca7e08b4b59f4b7e1027a79b69cd890432545d6b2eb44637b1b3a970d2e63e5a54cea851c1e387f81f09734d37c7d7259b9444d0a3b1f3b038b6e25c5025a49566b26e6171cd3fd8b1c3f35460c7aa1e7d174766329fa652b27ceb671b3771c03cc3a86026d0f0e1f3332ca471192859d954233", @typed={0x14, 0x11, @str='/selinux/policy\x00'}, @typed={0x8, 0x1f, @ipv4=@loopback}, @typed={0x8, 0x47, @ipv4=@remote}, @generic="f24327c782dfca470cdf6df06dbaafa3332a0dc24e3118ad5f9387fdf885f201d936b4d361d5d3205a43c7f9aad170db8336be7b0ac36c9d3e25741788b6adbc4ab73aa83efe4a51e3b0a758afae28fd1eac39cbabc3c8c50ef340a8f4eb0a56f6c6fc237b99f11a649e53bf400569c9ad606f8b835d37db6aa716e5e4fb354d89bdd573170d04c8c22b9197b9", @generic="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", @generic="09811139eea6fef3ba1936bcb8da942a2d04da5e0a6dd43121600668552a8cb548d12639ced81e5179b0ee24eae0c457e0e764db45604eb3aa8c9e7d1291f68460c8ae9d1ffdc60a3910ebbad597654499feb5edddf40e76eaced12ab9ed96c9fca8ce5220f05c94006703", @generic="5efe413d60fd7e153a7ed254f4feae74c7bcfffc99044e4289327518a781de85c905c5866f2683e78c6479bf9d5939ba7d1727652cabe11954c05394c30e8a4a2f98763cf7631f1290dcf371547e6404f225c03d9ad0a035b5339268f51e58fcca565b5d598cff5ddede2b3f01", @typed={0x8, 0x6b, @u32=0xe64}, @generic="4574801ca300891fbabf9827fbc98bc5b6a6f511b914cb2eed310d64d20399a2dfdae4b842363517d354d09fe7b24fb1b94349fec945fba76df2eb"]}, @generic="21fbcb88813b89"]}, 0x1584}, {&(0x7f0000001bc0)={0x1c8, 0x28, 0x2, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x174, 0x79, [@generic="f01399170c10abf851014b91c7dff577b4c4c84294d4116aecbc86e2", @typed={0xd4, 0x7a, @binary="7bcf49baf547000ca8e02cdedc52e62978715c471e18c0775c3183510f53f1da61e9bb427294881dcc203ccc95416add35387eef148eec14c815c47f1db8df2ad51ab349e18b6af5d0ea88888f1fb5d3c91d524c1946642d102b873feede6c063fb4197e557f099f34fb14fecf1da4153b955419dea0a2f6b480e27cd9cd5eacfd8cd7e1d7d4388cc9f0285b0f0a126b534d5a0e0d278dd98c788f54a5d29ac11d941c820a868d2e436a7b166a2024f3feafc90e181e9fae34055d0415fa79f48bfee2f9d83ea68cd9a02a169d9a1b56"}, @typed={0x14, 0x79, @ipv6=@local}, @typed={0x8, 0x31, @pid=r8}, @generic="fa1d09812cfc95ef7b62ad2fbb656c7506b8a924469afa138a01e08d83255be83808d8f69109a8db7bfc50ad33b1824802f4af26bcf630383fec48ff504bb88c6d2c811fe7c9c90b1fb532c77236a08132b8", @generic="0953247c9bcd1aa8a86ea7478f0031b1cfe6"]}, @typed={0x14, 0x2, @str='/selinux/policy\x00'}, @generic="33d5b2f76571c5f96bb873b6d78f3a87b65b6140aab137f9d68e29172868ebd18f2abcdadff9e0ee89f1fe2c60"]}, 0x1c8}], 0x4, 0x0, 0x0, 0x20000000}, 0x80) [ 2296.171603] audit: type=1400 audit(2000000591.310:62999): avc: denied { map } for pid=13628 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.260598] audit: type=1400 audit(2000000591.310:63000): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.337992] audit: type=1400 audit(2000000591.310:63001): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.440240] audit: type=1400 audit(2000000591.370:63002): avc: denied { map } for pid=13628 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.490611] audit: type=1400 audit(2000000591.390:63003): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.558395] audit: type=1400 audit(2000000591.390:63004): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.642164] audit: type=1400 audit(2000000591.430:63005): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.720211] audit: type=1400 audit(2000000591.430:63006): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2296.776988] audit: type=1400 audit(2000000591.490:63007): avc: denied { map } for pid=13628 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:12 executing program 3: r0 = inotify_init1(0x80000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82) syz_emit_ethernet(0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="00002000000000000290780000701d7be05249920000e0000001110090780000000000e00008000000000000000000000000000000"], 0x0) setrlimit(0xe, &(0x7f00000000c0)={0x1, 0x1}) 03:43:12 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x288, r1, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb38e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3953}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2fdb}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7b6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f9a}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfece}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x21a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff30b9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffff8c0e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa229}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x4}, 0x40) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r2, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:43:12 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffff9c, &(0x7f0000002100)=[{{&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/65, 0x41}, {&(0x7f00000001c0)=""/153, 0x99}, {&(0x7f0000000080)}, {&(0x7f0000000280)=""/138, 0x8a}], 0x4, &(0x7f0000000380)}, 0xa6}, {{&(0x7f00000003c0)=@alg, 0x80, &(0x7f0000001980)=[{&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/147, 0x93}, {&(0x7f0000001580)=""/154, 0x9a}, {&(0x7f0000001640)=""/138, 0x8a}, {&(0x7f0000001700)=""/110, 0x6e}, {&(0x7f0000001780)=""/96, 0x60}, {&(0x7f0000001800)=""/20, 0x14}, {&(0x7f0000001840)=""/65, 0x41}, {&(0x7f00000018c0)=""/143, 0x8f}], 0xa, &(0x7f0000001a40)=""/176, 0xb0}, 0xffffffffffffffc1}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001b00)=""/34, 0x22}, {&(0x7f0000001b40)=""/230, 0xe6}, {&(0x7f0000001c40)=""/133, 0x85}, {&(0x7f0000001d00)=""/59, 0x3b}, {&(0x7f0000001d40)=""/126, 0x7e}, {&(0x7f0000001dc0)=""/73, 0x49}], 0x6, &(0x7f0000001ec0)=""/109, 0x6d}, 0x4}, {{&(0x7f0000001f40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001fc0)=""/120, 0x78}], 0x1, &(0x7f0000002080)=""/84, 0x54}, 0x7}], 0x4, 0x100, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000002200)=""/106, &(0x7f0000002280)=0x6a) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x32) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:43:12 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0x9562545) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:43:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000001c0)) inotify_init1(0x0) getsockopt(r0, 0x8, 0x80000000, &(0x7f0000000200), &(0x7f0000000240)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8000}, 0x4) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/95, 0x5f}, {&(0x7f0000000100)=""/126, 0x7e}, {&(0x7f00000002c0)=""/245, 0xf5}, {&(0x7f00000003c0)=""/62, 0x3e}, {&(0x7f0000000400)=""/44, 0x2c}, {&(0x7f0000000440)=""/51, 0x33}, {&(0x7f0000000480)=""/14, 0xe}], 0x7, 0x0) ftruncate(r1, 0x2) 03:43:13 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x35, &(0x7f0000000000)="7a2b298f1cd060e245e63562013bff7e42b68f2a1bf1b3f15583acd66d7f4530db793b4d4d356669c11b73813c72cce6d451de44eb7e9839c2ccc989293f8264740bf422c3b7d888f0fbee90e81b663a72c24dd7f475a999fce713494bcfd7fa83afd34d3e52898d93c2569c9cce59637c74f403ca87ca09f2fa36c96813424f065f57968b5410ea7653a119caa9c54e6d007e04933d2897860a1d1d91db7681a86ca78a334a2c32f33517b0c5") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:43:13 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="e5d00be67983aaaaaaaaaabb080062000020000000800000000000000000e0e1ff00110090780000000000e00008"], 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='pipefs\x00', 0x20, &(0x7f00000000c0)='*\x00') r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = getpid() getpriority(0x0, r1) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) write$P9_RWALK(r0, &(0x7f0000000140)={0x23, 0x6f, 0x1, {0x2, [{0x0, 0x3, 0x6}, {0x20, 0x2, 0x1}]}}, 0x23) 03:43:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000040)) getpeername(r0, 0x0, 0x0) 03:43:13 executing program 3: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="e5c1a2e67983", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "00e00008"}}}}}, 0x0) [ 2301.620404] kasan: CONFIG_KASAN_INLINE enabled [ 2301.625123] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2301.632468] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 2301.639256] Modules linked in: [ 2301.642462] CPU: 0 PID: 475 Comm: kworker/u4:25 Not tainted 4.14.102+ #17 [ 2301.649401] Workqueue: netns cleanup_net [ 2301.653469] task: ffff8881c06cde00 task.stack: ffff888169c20000 [ 2301.659513] RIP: 0010:get_work_pool+0x9f/0x140 [ 2301.664071] RSP: 0018:ffff888169c27a28 EFLAGS: 00010006 [ 2301.669417] RAX: dffffc0000000000 RBX: 0000001ffffffe00 RCX: 0000000000000000 [ 2301.676664] RDX: 00000003ffffffc0 RSI: 00000000ffffffff RDI: 0000000000000046 [ 2301.683912] RBP: ffff888169c27ba0 R08: 0000000000000001 R09: 0000000000000003 [ 2301.691162] R10: ffff888169c27830 R11: ffffe8ffffc1805b R12: ffff8881a6cdf0d0 [ 2301.698439] R13: 1ffff1102d384f4b R14: dffffc0000000000 R15: ffff8881a6cdf0b0 [ 2301.705693] FS: 0000000000000000(0000) GS:ffff8881d7400000(0000) knlGS:0000000000000000 [ 2301.714008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2301.719957] CR2: 00007fff1c707c50 CR3: 00000001f1426003 CR4: 00000000001606b0 [ 2301.727225] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2301.734488] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2301.741770] Call Trace: [ 2301.744360] flush_work+0xff/0x710 [ 2301.747886] ? insert_work+0x2f0/0x2f0 [ 2301.751754] ? _raw_spin_unlock_irqrestore+0x54/0x70 [ 2301.756898] ? trace_hardirqs_on_caller+0x37b/0x540 [ 2301.761896] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 2301.766999] ? debug_check_no_obj_freed+0x2a9/0x5c0 [ 2301.771996] ? lock_acquire+0x10f/0x380 [ 2301.775971] ? debug_object_activate+0x4f0/0x4f0 [ 2301.780716] ? mark_held_locks+0xa6/0xf0 [ 2301.784788] xfrm_policy_fini+0x29/0x260 [ 2301.788837] xfrm_net_exit+0x19/0x30 [ 2301.792534] ? xfrm_policy_fini+0x260/0x260 [ 2301.796834] ops_exit_list.isra.0+0xa8/0x150 [ 2301.801228] cleanup_net+0x3ce/0x860 [ 2301.804929] ? net_drop_ns.part.0+0x70/0x70 [ 2301.809250] ? lock_acquire+0x10f/0x380 [ 2301.813230] process_one_work+0x7c6/0x14e0 [ 2301.817473] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 2301.822140] worker_thread+0x5d7/0x1080 [ 2301.826108] ? process_one_work+0x14e0/0x14e0 [ 2301.830590] kthread+0x310/0x420 [ 2301.833936] ? kthread_create_on_node+0xf0/0xf0 [ 2301.838612] ret_from_fork+0x3a/0x50 [ 2301.842339] Code: 89 c4 e8 c5 5f 1e 00 4c 89 e0 5b 41 5c c3 e8 b9 5f 1e 00 48 81 e3 00 fe ff ff 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 84 00 00 00 4c 8b 23 e8 8f 5f 1e 00 5b 4c 89 [ 2301.861549] RIP: get_work_pool+0x9f/0x140 RSP: ffff888169c27a28 [ 2301.867583] ---[ end trace 6b31c97802703ca9 ]--- [ 2301.872314] Kernel panic - not syncing: Fatal exception [ 2301.877973] Kernel Offset: 0xce00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 2301.888796] Rebooting in 86400 seconds..