087b774021d942b415dd7288cda2c2e312210c912387aac6bca412153c9e7290678cdaf28e42a4ba07efe8bfc6a906e4d9dec062ad591f55660264cef17da412aba31091a9ce6155cc15af809c99901c576c9b0b621267e9ff43c1d208df32a2905039595ddb1c4d8000000000000000000000000000000000000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 03:35:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd"], 0x2}}, 0x0) 03:35:43 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x0, 0x3, 0x1800000000000000}}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000800)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf2\xbbg\xcc\xce\xbc\xd5\x13\x8bQix\xcdB5\x0ey?\x98\x11\xec\xb0U\xf3\tL7*\xef$\xa2\xa2\xb4\xf0\x8c\x1c:4\x82\xb5q0\xf4F!Yu\x7f\xc4\x95\xd3\x931,\xd5\xe1\\\x1c\xd6R\xc0\xc4k\x12j*.3\xb2_$\"\x83\x9f\xf9\xe1\xa4^P\x90\x85\xd0\xbc\x9f=\x1c\x05\xcc\xac\xf1\x1f\\\xe1\xf6\'\xc1\xaf>\xa3Ql\xe0\xda\xf6x\x12\xae\xd5\b\x16\xd2p&\xc2W\x18\x05\a\xfe4C&\x1e\xbf\x8c\x8f\x8e\xcb\xd5\xd2\x92I\xf2\x1cOJ\x1f\xd2Z\xc3\x96^~{*V\xd4\xeb<\xe4`\x1d\x92C_\xe2\x87\xf1\xd9\xbe\xcd\xa2\xb3T\xfe\xe2A\xe9\xed?m\xdc\n\xf9\x00\x00\x00\x00', 0x400000000000001c) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) unshare(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000440)) r3 = fcntl$getown(r1, 0x9) sched_setscheduler(r3, 0x3, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x0, 0x800, 0x4000000000000403, 0x0) creat(0x0, 0x11) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ftruncate(r4, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) statx(r4, &(0x7f0000000140)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000340)=0x1) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 628.259970] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e21}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) syz_emit_ethernet(0x3de, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0180c24fa0f7d041a1d0d4b25b4f72178238bf0000000000140000000800450000240000000000009078ac14140de0000041"], 0x0) r2 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2, 0x5, 0x8]}, 0x5c) add_key(&(0x7f0000000140)='id_legacO\x05', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8e065c10a57b82c350d949ea8cf782bcc24ca6a099b8a8a4d031f58a4d65e883935b8ae9b3f65ef5bdfc548004b029f1000642a19c46924ec12e84c1eaf2509b181b577ba0af0ef6647fc0e35e4da54d49f64bde120d45527095cb973ac0c0dc0b2b3cdda4d52d8e20558670fbbf2f2430208b1fc9e5313960ab6f88f8911d475c887754a6d416ff81b78b2a030d1c354c8c5bba687b06ea1222d32e6a2e15db39faa01cd77ab349440da5ef14b318d6e1964d189f041390d191fb2a46b7045c2b6ccc447b425fdfdb6c6187c74071f78394d2a8777f54a1b444f0011e771d1577167d4e777c3b4e16e3bd1ca397d56d79e6e1f6a42cca0c64", 0xf9, 0xfffffffffffffffc) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000500)={'\x00', 0x3f}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000580)=0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000003c0)=0x8be, 0x4) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x6, 0x0, 0x200000000, 0x0, 0xfff, 0x100, 0x8, 0x2, 0xec9c, 0x7f, 0x0, 0x1, 0x6, 0x2, 0x8, 0x5, 0x40, 0x1, 0x3f800000000000, 0x0, 0x7, 0x3, 0x7, 0x9, 0x9, 0x3e, 0x3, 0x3, 0x100000001, 0x8, 0x3ff, 0x1, 0x0, 0x860, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xdb4a33}, 0x1000, 0x2, 0x8, 0x4, 0x5, 0x6, 0xee}, r4, 0x5, r3, 0x9) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, 0x0, 0x1000001fa) socket$inet6(0xa, 0x0, 0x200) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) ftruncate(r2, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)="10ec", 0x2, r6) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000680)) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="686291b2a30275394e020a000c020000"], 0x10}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) [ 628.617314] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:35:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x0, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 629.381095] device lo entered promiscuous mode [ 629.386789] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 629.408009] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 629.431435] Y4`Ҙ: renamed from lo 03:35:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x0, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 630.141664] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 630.287367] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 630.392443] kauditd_printk_skb: 200 callbacks suppressed [ 630.392451] audit: type=1400 audit(2000000145.696:21666): avc: denied { map } for pid=17307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.421218] audit: type=1400 audit(2000000145.696:21667): avc: denied { map } for pid=17307 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.445471] audit: type=1400 audit(2000000145.696:21668): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.469975] audit: type=1400 audit(2000000145.696:21669): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.519855] audit: type=1400 audit(2000000145.706:21670): avc: denied { map } for pid=17307 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.630285] audit: type=1400 audit(2000000145.786:21671): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.690339] audit: type=1400 audit(2000000145.786:21672): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.770150] audit: type=1400 audit(2000000145.836:21673): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.850078] audit: type=1400 audit(2000000145.846:21674): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.902356] audit: type=1400 audit(2000000145.876:21675): avc: denied { map } for pid=17307 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:46 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x7) lsetxattr$security_smack_transmute(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@deltaction={0xb0, 0x31, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0xc, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x2a}}, {0x10, 0x1f, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @TCA_ACT_TAB={0x4}]}, 0xb0}}, 0x20000000) poll(0x0, 0x0, 0x4000083) rmdir(&(0x7f0000000600)='./file0\x00') connect$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 03:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:35:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x7, 0xffff, 0x1, 0xd58b}, {0x3ff, 0x5, 0x2, 0x1000}, {0xfffffffffffffffc, 0x5, 0x26e, 0x100000000}, {0x4, 0x7, 0x9, 0x3}, {0x81, 0x1818, 0xab9c, 0x7}, {0x2, 0x1, 0x6, 0x2}, {0x3ff, 0x6, 0xa0fb, 0x80000000}]}) r3 = getpid() ptrace$getregset(0x4204, r3, 0x202, &(0x7f00000001c0)={&(0x7f00000000c0)=""/238, 0xee}) getsockopt$inet_int(r1, 0x0, 0x13, &(0x7f00006ed000), &(0x7f0000000200)=0x4) 03:35:46 executing program 0: truncate(&(0x7f0000000180)='./file0\x00', 0x28) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) write$binfmt_elf64(r2, &(0x7f0000004000)=ANY=[@ANYRESOCT=0x0], 0x17) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000280)) fcntl$setlease(r0, 0x400, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000080)=""/255, &(0x7f0000000200)=0xff) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000240)=0x3a, 0x4) openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) connect$unix(r2, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e23}, 0x6e) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) read$eventfd(0xffffffffffffffff, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000001a80), 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) 03:35:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:35:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:47 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ifb0\x00'}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2120, &(0x7f0000004540)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000200000002, &(0x7f00000002c0)=0x3ff, 0x4) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x32800, 0x3}) bind$inet6(r1, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000100)=0xfffffffffffffff7) 03:35:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) mknod(&(0x7f0000000080)='./file0\x00', 0x800, 0x3f) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002a0007021dfffd946fa2830020200a000500000000030000000000000000ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:35:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) [ 633.054593] nla_parse: 2 callbacks suppressed [ 633.054616] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x1008000080004509, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') syz_open_pts(r1, 0x0) [ 633.254846] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:48 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={r1, 0x3, 0x6, @local}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) dup2(r2, r0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80080, 0x8) [ 633.564023] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 633.732471] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3f60000", @ANYRES16=r4, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f00000001c0)={0x99, @loopback, 0x4e21, 0x1, 'fo\x00', 0x29, 0xd93, 0x80}, 0x2c) getsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000b67000), &(0x7f0000000100)=0x12e) getsockopt$inet6_buf(r2, 0x29, 0x2b, &(0x7f0000000240)=""/131, &(0x7f0000000300)=0x83) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0xec, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xcc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x96}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x65e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x20004014}, 0x4040000) sendfile(r2, r0, &(0x7f0000000200), 0x7) ioctl$VT_OPENQRY(r6, 0x5600, &(0x7f0000000140)) connect$netlink(r6, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfe, 0x50000002}, 0xc) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0)=0x7, 0x4) 03:35:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) [ 634.247019] device syz_tun entered promiscuous mode [ 634.285350] device syz_tun left promiscuous mode [ 634.309113] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 634.341112] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 634.376242] device syz_tun entered promiscuous mode 03:35:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 634.403465] device syz_tun left promiscuous mode 03:35:49 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="345775f14b41f3d467aecace767b6402cc7a8926b77aafcfe4bc68521346f31ed6ece269ecab2307c0b6beeaef0f08fdefc71cb15621d991d1ab77b3f481ec96") perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x1) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000000)=0x81) timerfd_create(0x7, 0x800) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fcntl$setpipe(r2, 0x407, 0x7) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) fcntl$getflags(0xffffffffffffff9c, 0x401) 03:35:49 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xd) flock(r1, 0x12) flock(r0, 0x1) r2 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f00000000c0)=""/57, 0x39}], 0x10000000000000b5) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r3, 0xa, 0x12) fcntl$setownex(r3, 0xf, &(0x7f00002cb000)={0x0, r2}) recvmsg(r4, &(0x7f000070bfc8)={0x0, 0x0, 0x0}, 0x0) r5 = dup2(r0, r4) tkill(r2, 0x13) r6 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)="68dc0bcb1aea5066e4750685ed6558139cc7502fc82277438c97cd5fbc6b387892530ef5bc347c0b67d8709360870f0a4b0b4f24996b892c55b7117575df397648585b619f27a7e4d48a4c44c034b33785da0b3e4a4e58105454db6c25dd7f7f3e11824fae95d3ad8902dee73a32a95551afe6f424374062fa26862b4ef01ab6d95a2bf869f697a32197ddbc15e37c6c703204c00071fb46ea", 0x99, 0xfffffffffffffff9) r7 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r6, 0x8001, r7) fcntl$addseals(r1, 0x409, 0x8) fcntl$setsig(r5, 0xa, 0x9) 03:35:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) [ 635.056644] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:50 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) dup(r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x0, 0x7}}) [ 635.314216] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 635.327050] print_req_error: 25 callbacks suppressed [ 635.327076] print_req_error: I/O error, dev loop0, sector 520 03:35:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/171, 0xab) fchdir(r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) r1 = epoll_create1(0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x22e82, 0x0) fcntl$setlease(r0, 0x400, 0x2) write$P9_RFLUSH(r2, &(0x7f0000000240)={0x7, 0x6d, 0x2}, 0x7) ioctl$UI_DEV_DESTROY(r2, 0x5502) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x149) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1f, &(0x7f00000001c0)=0x7ff, 0x4) fcntl$dupfd(r1, 0x406, r1) [ 635.413881] kauditd_printk_skb: 190 callbacks suppressed [ 635.413889] audit: type=1400 audit(2000000150.706:21866): avc: denied { map } for pid=17408 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 635.544514] audit: type=1400 audit(2000000150.716:21867): avc: denied { map } for pid=17408 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.662922] audit: type=1400 audit(2000000150.756:21868): avc: denied { map } for pid=17409 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.822696] audit: type=1400 audit(2000000150.756:21869): avc: denied { map } for pid=17409 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) [ 635.951386] audit: type=1400 audit(2000000150.766:21870): avc: denied { map } for pid=17408 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.984153] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) 03:35:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 636.079257] audit: type=1400 audit(2000000150.776:21871): avc: denied { map } for pid=17405 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:51 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80800) sendmmsg(r1, &(0x7f00000069c0)=[{{&(0x7f0000000200)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000280)="798c54218cf2dc0042af0cb0eb533f1b7c7f0ccc4b7b46695f03dd05a9be3d1e1b2b827eb6794807c1ecc64a541b6facd982005a9b882a447775b04c7f99d8eae0159a8ea8b5dd48fb5743d5c0", 0x4d}, {&(0x7f0000000300)="43a7e021f6934e7ab5f7bce28c692a1d593725add2f898b27cb48560902ff5b88325d1031717093d9dab4a59c54348e2d9e99719719b534e65dc48e58b7b460409ded39ccdaeb5", 0x47}, {&(0x7f0000006ac0)="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", 0xff}, {&(0x7f0000000480)="ea878697446d63094d32b3d79240106be006efafd49a3209ee2741301811a9be6bdd1e1286ff8e82367f0fad5c3663742ff98891113500211160c74756af7568248ee1d3d9204764fd3b466c8437461a54b39c2b636699867600fea2ab0149685055e663a79580d9d1c9c10c59e46b1a40381b1a068bca0c330c5b69a020df0a2839005aa1cd5ac352fd08428b5465f6199a2a7387fae3238474923293b78a272ef7a6f00fa20376994055d24bd1b194f8", 0xb1}, {&(0x7f0000000540)="b213a1c709107ef47017bcc8b9b4faacf5c422f390f59dc1af2f433e989e545216d6ec6aedcbcb81f8fda2cc4856ca9ba1cedbf05547416081d4ad46d6d3bc9cfaffee03a033ad9d3047ab56d514f8c89affeb89c30584be87d36a34def1cec93e248e599d9bac68ce4f229cd40b2348e6f947040187dabee59d723aed6095a2385803a59a40bdac59a79029b878dc617aa84e72bd64ae2d239f9400e36a93eab1adbc1413b225c66b22", 0xaa}, {&(0x7f0000000600)="917d4e7833158c703127c40a7698bfd8990d6f76c5c9336df5ff40f51e4480e569f83dd5347e54e799f91d33e43dad343c283191fecca542a2d0e867cb1747e8cc4a9c8b22da368b18a9e2823feb47dea838531ca012a9c211a1537b42248038d0a91d2c666247fd512b2e3d54e2eb6b8e11c004a66852e5499b88c815cac8ab12af6b3373aa4ff6143205b95dfde12e4f2718683992bb35553d8fa1b9e163a23e9622c5c70725b20f99582ef1195703087e68c9019d04264205a751d919c96cb48999e85d9613bcbe91cd05f2d93a4854806ea520d6463ea01de721d758d549b1d89537a0700b0ec0fb540b30e3cc37", 0xf0}, {&(0x7f0000000700)="bf5bb777ae80943fc197507f886901d75715b60946c789b8067b8d40d7df4151e9aa3c04b4b1623fd6b335049df7ac936f054800b37ca35c77599373796efa0972", 0x41}, {&(0x7f0000000780)="b4afe050cda84c623c15100252d962cae0880e551faee66bfb84f8ae0224a8513689bb55e4cba73c9dc50bdfe99c79e473841dfa38e65c64b954ebb0a8f772965459bacb4f1c5f0a246ce8b38d5f69ba50ee8b26dc2d0be362d686376516962fc38847c6bd43842bd8d54037bb6baf2cfb8a288860534ed997bbe94936668f103630040970eabad30cfeb5742cecf5", 0x8f}, {&(0x7f0000000840)="03b4d69518b167c106a06fd5c783df884089cba7be229012f0223c81112c8d7f019ebcce1e2fa8064dd29425a3113fbc5d2c9cb687b9e12f699741abe57b7d323e1b132bcb2f71573340fce66e54a5f32f58072817614bfa27274b30af3e8c8e6f47dc49ed2364329ae4ec72aae2407028fc0308824bec56cf75b2c14713f463dc04ef61a930cdd0ffc1af0fee757c064e79777f7fd7fd78d270e118b118825d4dc5cc7c8b80d5aa3482a4b3d0e7da72c413197c6642cdb191c0e5264b5a2f4e77eeaf8c", 0xc4}], 0x9, &(0x7f0000000a00)=[{0x1010, 0x10c, 0x1, "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"}, {0xb0, 0x11b, 0x3, "1fd1977b4086aaecfddb0a6b85f774688633e93233901c7844ae3c1b4dc4efd500da1b1a3f36ff9142f0a3c00dbd4d606b01a6e65f6a758c962d25bb6163b084f2c03658e3dfb51b5bde291e906567cf23a7527dea17a796cc5e760f56ec2b0f09e1d1fa2b786975d3c8488803ed288ea04ee461d0aa9b4e46d8cc23201c7545e8822b89e11789f1f15ade872c74b39985bce2030728057e85b7"}, {0xa0, 0x0, 0x0, "b219bf0e54f1cdaa600f30012bebfaf0b6aa1dcca8298dbb9a844be9579b6bace57e3b846b082d78781fe314f1f47e877e007746feed8621dd574e19b8642d45c3b59797e7944fb72fa2dea2bb49cfb175de094114e77f6aa23a1b7a88a289e61d1a24dcf902d1180adf1cf70717bfec570be40b955ca4e59232f3a36c3c52842b18f5cf83e2902fd5e6"}, {0xa8, 0xff, 0x800, "6347bcb9ae85b26c9094347a15449241173166c2955e247bdd7c3082cbdec9cb67527156ad27adcc7ab4114af5662a1e47f0cbfa1d68733ed2135da588abea796617f371f309c926a8fa457751e746d774bab1e43c0caaec48308d058ab07383849790c8edaf73ae5e2f74ae9388fbd486e8175a4eaa253a1b2604f711ebcc8c8991121010b2ddf71819f14af37398dae7771a990d"}, {0x90, 0x10a, 0xffffffffffff7fff, "6596a4e14b06189065377f96d112b0e5065ae28f3e6ec7f39f4e6774c3d79b5fbf097f65d46f3d476d17af8709a5e622daf522383dbaa9f2ac72227af29aaa20a4d9751ace09148acc7acbf6f266184daef3f8973374d603a6afcae1642794324c750a5ead20582562882dab66d26691c6d79dc449a262448c8223a5d82a1dd7"}, {0x88, 0x19d, 0x8, "cac7a771bef74d2190330063e745db11df6fcd830c19be0c3d7419ed2e9ddc873c2d6a0ad8012f406a34284fe1a5e1c774dd059a761347ed909cac7e8870e440cbcf62aeb5212e557e9756b0ac5ec53a1ec833fdf76e4779b92e1bec202f707a60a055d21915fd38417e46fc7ac1f48ec2dfb3b49a3a"}], 0x1320}}, {{&(0x7f0000001d40)=@nfc_llcp={0x27, 0x1, 0x2, 0x7, 0x9, 0x1, "a57d5168278218c868092019af66ff5b383824c1cc53b1cf74dd75796e229455149e91f15dff5ea2d8991cf8582ebffe93114a7a433df0549f6f8b4a46b1eb", 0xe}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001dc0)="7b18e800686a28d7d86736ec7abae6fb6911b83fd144ec2aa99c4782d12ceff0ca7170248310033acc0355130b276c8d04f1ebf08ecc86848e003aaa94c100fc58f2d1d365ff67cdd957e5d51d9f7526c38686e2adfbc85cc9f6ea74088b0e6b5c0b716b686d19dd01534fae0c3222d3046248db22f94c68faa2c5ef5966b9fff715d6bab88c427992a9da5af4c7b749430c1fc65fea788c73cba93b66369a6498d647606f2a8a98ca70f5ada2d9efa127db738b4342ba4a21fcc7a470d6817fe9e9c0511a8df2a9756353f30fa2597b1930cc8d5e177429831835652e99468e778216e0aa2eb178c127", 0xea}, {&(0x7f0000000140)}, {&(0x7f0000001ec0)="3dfd445e474f64ca91e04c55eed65bfa511b89b578df7952afdd293913aa7bed69e1ec583eb0d83f866071dcd39d95db1da14f73e8c4f15f4c248fe12df2d0c965e4407a390ddc7d05c2f5bc2c59d55f859b245fc79172364f6f64623fc70e7506b69ff22c8b61f0fa84beb73bae", 0x6e}], 0x3, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], 0x21d0}, 0x5}, {{&(0x7f0000004180)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x80, &(0x7f0000005240)=[{&(0x7f0000004200)="7f7026999744262912b127fe03fe93", 0xf}, {&(0x7f0000004240)="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", 0x1000}], 0x2, &(0x7f0000005280)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x6}, {{&(0x7f0000005440)=@llc={0x1a, 0x8, 0xf91, 0xfffffffffffffff9, 0x3ff, 0x3ff, @local}, 0x80, &(0x7f0000006840)=[{&(0x7f00000054c0)="2b0b51adf65e8f9e0421a2e3147f0356b10a71282f3177b1ca9708fa3e8934584f3c47afcf07556ed723b4fc9465b0c77ac4c6186103425ef65bc0ac436589a7728334ab86238fd864e5149f98dfd79cd90124d70a118e6cb8442f6fc8e82b76f937eb527a9a82fe41e489da932c8c2a7b5d2bfae50178420da3c65a8ee3f541b2a6eecc88e4bf7aa24efa70d4e92811b3d5b6d743478f28598b9a1da671f3bcbec70c6b07c14f2387a8b8a0a5eef646f253bf6a9f7ee7cb41015752cea7081a92df322ad9f6763b10c2f22144de7118b6f545de3aad03825dbda8a6e51d208d", 0xe0}, {&(0x7f00000055c0)="21d65256a7be0bd6f410202ba4c9da787d24bcd2be90f8bc46c44f215724aac9b6ea054b5ff1cc863a5ec68b02f7d6b0d4620930b25c7f20a92ab9992409b2cc28f5b05132dddd1548bbd9576926300d39bcc3c16dc2cc0a1e522068fe9a3b0fb3284ad897bbe30870506e44af38227f52a805bce45a6be1c458ded96438cec2988d075b6352f8b719856607d84aae4b555bed39fc6712608acdd3dc958169bd", 0xa0}, {&(0x7f0000005680)="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", 0x1000}, {&(0x7f0000006680)="024b9db84cdcda39b3eafbede33d2980c419b97cbe827212aa227f374c1c617d12944a685f1f9d95c75ae95320c8ea3cf47a56721cd1fc320b8836416d874585e1e4dda1618ae1b6fea958b01e9ddd94bb4ac76c066b68325b48638beee40e84a61d1c1e48b9969c67dc1519add1a527d7401b3ae5df1b860704eaa07ea7415c6e908d4740a3b609b6c1943981b5b909772bb777459dc8dcf56038218f4cc7596155b227e8bfc002266e0b7e68f3b3ddadb2ef0e043a91cb61f89c34558751c1a965c976ff2012e5db46aa5bfce499a7bf5f14e73135c10f7319ca446a8a9755cc3b24", 0xe3}, {&(0x7f0000006780)="1321796a07042a0344734535142d32e4cdbaf84e2165a04a94e6b84ceb96bb669aabe78a15798ee807409a1e2a02933d6fe42f7792d0a21d9629be28d1ca3ec74deac154804f72084637d76980506fc6cc6798235b31ee66b21be7bbd5b1995d3f66defb4de95afc7268bda2e88dabd34bfadb66554111f5d8feff49306039a0836b447f8398ea818001eecbb1de48bef56d243eb795ad9bd3f6fcc0c4e3cf6a", 0xa0}], 0x5, &(0x7f00000068c0)=[{0xf8, 0x104, 0x8001, "ab657f36c9cab2edde519b40f67ba6e40909f27197a2bd980940bb827e598583121a66fb08513ebc2232a34b4651365d24664b2c77415c36d4c1d9a7382a61851c5da803b3a82ef35fd9736f741afd8d488b70fb53979aaa5bec18fee55e57d979b8c76644ece333ad3ac15ec060b1314ab12c9a44c9c69dce515bc20cc2936202ea7f4a18bae327a91b392ca4bf6997221e71c3249471bef135f5c70d8dfb73469519edc4637665c4e0c1c53e11391db4249d33b9039ae32ac96e5be86a4d8cc46bfafaa6746de120b9e075b35a5a346a860cfee4d754387e3a769c18b8c5efe2acb3"}], 0xf8}, 0x1ffe00}], 0x4, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000140)={0x9}, 0x8, 0x80000) 03:35:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:null_device_t:s0\x00', 0x23) [ 636.411816] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 636.472080] audit: type=1400 audit(2000000150.776:21872): avc: denied { map } for pid=17405 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 636.569069] print_req_error: I/O error, dev loop0, sector 0 [ 636.574881] buffer_io_error: 54 callbacks suppressed [ 636.574889] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 636.576776] print_req_error: I/O error, dev loop0, sector 4 [ 636.580226] print_req_error: I/O error, dev loop0, sector 8 [ 636.580238] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 636.580260] print_req_error: I/O error, dev loop0, sector 12 [ 636.580268] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 636.580297] print_req_error: I/O error, dev loop0, sector 16 [ 636.580306] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 636.580325] print_req_error: I/O error, dev loop0, sector 20 [ 636.580333] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 636.580354] print_req_error: I/O error, dev loop0, sector 24 [ 636.580362] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 636.580380] print_req_error: I/O error, dev loop0, sector 28 [ 636.580388] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 636.580407] print_req_error: I/O error, dev loop0, sector 32 [ 636.580420] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 636.588167] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 636.593974] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 636.597818] audit: type=1400 audit(2000000150.776:21873): avc: denied { map } for pid=17405 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x147) fadvise64(r2, 0x100000000, 0x80000000000004, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) connect$inet(r4, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000380), 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) r6 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xc19, 0x40) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc0250000ef2d17e6903baf665d7924000000000007000095000000000000000000000000"], 0x0, 0x5}, 0x48) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0x40345410, &(0x7f0000000200)={{0x2, 0x3, 0x800, 0x3, 0xb1}}) ioctl$BLKTRACESTOP(r7, 0x1275, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x3, 0xfffffffffffffe4e) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000002c0)) 03:35:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) 03:35:52 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) fallocate(r0, 0x14, 0x8001, 0x100000001) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001a0000000000"], 0x28}}, 0x0) 03:35:52 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000300)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x100000400000010, 0x2, 0x0) write(r1, &(0x7f00000000c0)="2400000052001f0014f9f407010904000200071008000100010000000800000000000000", 0x24) socket(0x8, 0x8000f, 0x40) 03:35:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 637.641164] audit: type=1400 audit(2000000150.786:21874): avc: denied { map } for pid=17408 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 637.810085] audit: type=1400 audit(2000000150.806:21875): avc: denied { map } for pid=17408 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) 03:35:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000180)=0x4c09, 0xff17) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b5887200000000000000000057a2d32741000000", 0x14}], 0x1}, 0x0) [ 638.459636] nla_parse: 2 callbacks suppressed [ 638.459644] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 638.650381] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='~\xea\x00w') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r2) unshare(0x40000000) link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="58e3817481a6a30c7023931300ea0d44818f2043b6ef3eb463a0a60364da31872addb737d23c2df7a9496bc93f74591d484aa15128d2bad6ae5a730a5de9506af9217963bbd3a29d", 0x48, 0xffffffffffffffff) keyctl$negate(0xd, r3, 0x1, r4) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000100)='system_u:object_r:updpwd_exec_t:s0\x00', 0x23) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x820a, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) write$UHID_GET_REPORT_REPLY(r5, &(0x7f0000000200)={0xa, 0x6, 0x100000000000007, 0x80000000}, 0x90) ptrace$setregset(0x4205, 0x0, 0x201, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c7465720000000000000000e5ff0000000000000013000040000000000078000000b0e9d268280b289f7c78fb74b0ff32c83c228b6b41c8d6ec0500000019426f1ecf521b712fa681c8ed00003009c07d45d40400410004000070c98a22fe1995345bf5eeccc7c7367531d384cd3f4bffe28a21bea5271770abdb5c319f52c519c9012dc353733e95254fd071d465d9ea8fa1278e302afa78dbb38b8e1951f61452b06ebc60b264140ac64c010100000900a26ff0494c62000000000000000000000000000000"], 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) fchdir(0xffffffffffffffff) 03:35:54 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) fallocate(r0, 0x14, 0x8001, 0x100000001) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001a0000000000"], 0x28}}, 0x0) 03:35:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:35:54 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) tkill(r0, 0x16) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000001180)="b93365d5c6c993361516ae4561e6c15bbbad9b0d23bda3d1be98541dbf4f9ea06ec89bcdb815f054a98aec15c895a0fa5ee4aab48464a9d12958e349ea2ea7efdc645ffd19744e3b2c0be3175b7ee639f2e3f8f9ef707c1439", 0x59) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001140)=0xe, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000180)) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) dup2(r5, r4) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getdents(r6, &(0x7f0000000140)=""/4096, 0x1000) [ 639.751934] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 639.956040] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x1, 0x0) ioctl(r0, 0x200, &(0x7f0000002640)="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") setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) keyctl$session_to_parent(0x12) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x30000001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000001640)=""/4096, &(0x7f00000004c0)=0x11dd) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x2) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000600)={0x2a, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="050000004001000080b7680ac96edda2e6801ee3acec15325b89351fb800000000000000000000000000"], 0x0, 0x0, 0x0}) clone(0x60002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) fremovexattr(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="8964bc06141857d9b8c216c1188ac4d123f8cbf72d4d4b649656d0d0b242e583a00396a55ab62bc3da8ea2943fdb7c659bdc39bd3c5ebfd6320422f2742deb8c5dda9ac7ce76a7da1769a20100bcb3164b6fa2b0eb37d271b7ab00417d214eac605b348f03081fcd6795b4783f94976d566a98637a6f089ffd5b23408a9b2a2e95f338488a4668fc13514001064bd6f6bce433301b6fc8655e577c8601c923dbf764feaf8f6de779a2528c0f0b5c4bb7bd5f35e22855e8f3c58ca0c50cf9042bf3a7587bfce83707fe67693e8294bbaf9c"]) socket(0x11, 0x80000, 0x9fa) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000080)=0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000180)) ioctl$PPPIOCSMRU1(r5, 0x40047452, &(0x7f0000000280)=0x80) 03:35:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 640.421763] kauditd_printk_skb: 116 callbacks suppressed [ 640.421771] audit: type=1400 audit(2000000155.726:21992): avc: denied { map } for pid=17527 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.471100] FAT-fs (loop5): codepage cp437 not found 03:35:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 640.582586] audit: type=1400 audit(2000000155.756:21993): avc: denied { map } for pid=17527 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.753635] audit: type=1400 audit(2000000155.816:21994): avc: denied { map } for pid=17527 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 640.995236] audit: type=1400 audit(2000000155.816:21995): avc: denied { map } for pid=17527 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 641.140976] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 641.182470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 641.238856] print_req_error: 60 callbacks suppressed [ 641.238864] print_req_error: I/O error, dev loop0, sector 128 03:35:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f00000005c0)) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 641.320651] audit: type=1400 audit(2000000155.836:21996): avc: denied { map } for pid=17533 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 641.438683] audit: type=1400 audit(2000000155.846:21997): avc: denied { map } for pid=17533 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 641.560549] audit: type=1400 audit(2000000155.866:21998): avc: denied { map } for pid=17533 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 641.735287] print_req_error: I/O error, dev loop0, sector 0 [ 641.741098] buffer_io_error: 56 callbacks suppressed [ 641.741106] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 641.752019] print_req_error: I/O error, dev loop0, sector 4 [ 641.753904] print_req_error: I/O error, dev loop0, sector 8 [ 641.759720] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 641.765415] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 641.765451] print_req_error: I/O error, dev loop0, sector 12 [ 641.765460] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 641.765487] print_req_error: I/O error, dev loop0, sector 16 [ 641.765496] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 641.765523] print_req_error: I/O error, dev loop0, sector 20 [ 641.765531] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 641.765553] print_req_error: I/O error, dev loop0, sector 24 [ 641.765560] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 641.765576] print_req_error: I/O error, dev loop0, sector 28 [ 641.773636] print_req_error: I/O error, dev loop0, sector 32 [ 641.780956] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 641.786767] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 641.794392] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 641.919803] audit: type=1400 audit(2000000155.876:21999): avc: denied { map } for pid=17533 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.051788] audit: type=1400 audit(2000000155.936:22000): avc: denied { map } for pid=17533 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 642.195831] audit: type=1400 audit(2000000155.986:22001): avc: denied { map } for pid=17533 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x200000003, 0xbb) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x10, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 642.457306] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 642.574787] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:58 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380), 0x4) ftruncate(r0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xf0, 0x1e2aeec0, 0x7, 0x6, 0x1f, 0x0, "4641250046ad30742eaf1b07f8ccecc5c9ab34854b6197e87fe869c4c34eee3892aac31a3d5b2feb7ddc1676e965c4f00043fa3030753ca800b950ab0e99576fff78d6cc5d2a344c8cce9036deec04af2ca31bd06c7e32e728b288781c8ca17cc5b5c3f272a25bb54d3ef719249e20613dbda7a1f78d129ccb5e8f90e846e72ed05b01d9ffe2d5410ba5698f3c87863717a16e84bc8336b0c4c2e6f7e9b9f4ad9e9a564077cb6d40ea1b2de8aec105c9b3150441ad45e54a9fcf1bc06b824eae516b24d93a0144e0d418b9fabbdefcde3bc7523d115ab0edb3ba88e1bddd5af804383feb748bfa94cd72a4aa37ca5469"}, 0x208) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f00000002c0)={&(0x7f000025c000/0x3000)=nil, &(0x7f0000052000/0x1000)=nil, &(0x7f0000036000/0x2000)=nil, &(0x7f00004b6000/0x1000)=nil, &(0x7f00004a4000/0x1000)=nil, &(0x7f00007bb000/0x1000)=nil, &(0x7f0000363000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000027000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) 03:35:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f00000005c0)) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:35:58 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='n\x01\x00\x00\x00ockstat6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) preadv(r1, &(0x7f00000000c0), 0x0, 0x0) [ 643.511087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f00000005c0)) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 643.692490] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:35:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0xc8) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000100)=0x4) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000140)=0x4) keyctl$get_security(0x11, r1, 0x0, 0x353298e8df139471) 03:35:59 executing program 5: r0 = socket$packet(0x11, 0x100000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004500)={'syz_tun\x00', 0x0}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r0, &(0x7f00000007c0)="050300000300000000000000c52cf7c21975e697b02f00066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be25", 0x44, 0x0, 0x0, 0x0) 03:35:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 644.677574] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 644.869860] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:00 executing program 0: r0 = gettid() gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x5, 0x0) pipe2(&(0x7f0000000040), 0x0) tkill(r0, 0x208000000000032) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@ipv4, @empty, @ipv4, 0x3, 0x0, 0x0, 0x800000000113}) ptrace$setregs(0xd, r0, 0x7ffffffc, &(0x7f0000000000)) mlockall(0x4) ptrace$cont(0x21, r0, 0x0, 0x0) 03:36:00 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000)={{}, {0x0, 0x989680}}, 0x0) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x77359400}}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000000c0)) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) link(0x0, 0x0) 03:36:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:36:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, 0x0) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:36:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) 03:33:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x4, 0x2000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x4, @empty, 0x200000000000004}, 0xb) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x27, &(0x7f0000001d00)={@rand_addr=0x5, @loopback}, 0x8) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2800800}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x240, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa572}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfc78}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3f, @mcast2, 0xc36}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xc6, @local, 0x3f}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @loopback, 0x2}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x493}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x81}, 0x4004001) sendmmsg(r1, &(0x7f00000092c0), 0x4f, 0x0) syz_emit_ethernet(0xff27, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x27}, @loopback}, @gre}}}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f00000001c0)=0xc, 0x4) [ 645.956400] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 646.069062] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd"], 0x1}}, 0x0) 03:33:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, 0x0) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 646.451856] kauditd_printk_skb: 113 callbacks suppressed [ 646.451863] audit: type=1400 audit(2000000000.710:22115): avc: denied { map } for pid=17648 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 646.572327] audit: type=1400 audit(2000000000.710:22116): avc: denied { map } for pid=17648 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 646.795284] audit: type=1400 audit(2000000000.740:22117): avc: denied { map } for pid=17648 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3a, 0x9, 0x2}, 0x2c) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x81ffff, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080)="dfff13a11fc8bc5e1678dbc057", 0x0, 0x1}, 0x20) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000002c0)) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, r2}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) write$P9_RREAD(r3, &(0x7f00000001c0)={0xcd, 0x75, 0x2, {0xc2, "3694b067f162963706240b7db739837d3bd816b09e6a71dd179352716bb5d21c3a5afc304a7d32214fdb5960af8213a1e107503f85b8f8bda713da9d1961830728cba911055ab924c6fcd14c46d5a107051ac34e61275abae319237eaa3f8da2b611c9afb448405dec9874c331d83152f1f3b3beac7a033bf7d0d2cbed3ad8fc1f06e1c251f28b565822b184725373c94b7aaf909ead872f7751e32985396ea225e1ee893d09e52abda4e15b21b4f14eaa7f4f3ebe612c233f58703e3d93fc5480d4"}}, 0xcd) [ 646.902704] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 647.105706] audit: type=1400 audit(2000000000.740:22118): avc: denied { map } for pid=17648 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 647.329127] audit: type=1400 audit(2000000000.780:22119): avc: denied { map } for pid=17648 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r4 = getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) rt_tgsigqueueinfo(r4, r5, 0x19, &(0x7f00000002c0)={0x7, 0x80000000, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) ftruncate(r3, 0x208200) r6 = open(&(0x7f0000000380)='./bus\x00', 0x14103e, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) r7 = getpgid(0xffffffffffffffff) ptrace$getregs(0xe, r7, 0x6, &(0x7f0000000140)=""/28) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 03:33:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd"], 0x1}}, 0x0) [ 647.507946] audit: type=1400 audit(2000000000.800:22120): avc: denied { map } for pid=17648 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 647.509475] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 647.661288] audit: type=1400 audit(2000000000.810:22121): avc: denied { create } for pid=17649 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 647.746935] audit: type=1400 audit(2000000000.810:22122): avc: denied { map } for pid=17648 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 647.771624] audit: type=1400 audit(2000000000.830:22123): avc: denied { write } for pid=17649 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:33:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, 0x0) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 647.820157] audit: type=1400 audit(2000000000.860:22124): avc: denied { map } for pid=17648 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000580)=@newsa={0xf8, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@extra_flags={0x8}]}, 0xf8}}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) [ 648.214926] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd"], 0x1}}, 0x0) [ 648.371920] print_req_error: 416 callbacks suppressed [ 648.371927] print_req_error: I/O error, dev loop0, sector 0 [ 648.383145] buffer_io_error: 413 callbacks suppressed [ 648.383154] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 648.396217] print_req_error: I/O error, dev loop0, sector 4 [ 648.401967] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 648.409636] print_req_error: I/O error, dev loop0, sector 8 [ 648.415424] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 648.423121] print_req_error: I/O error, dev loop0, sector 12 [ 648.428940] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 648.436658] print_req_error: I/O error, dev loop0, sector 16 [ 648.442527] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 648.450300] print_req_error: I/O error, dev loop0, sector 20 [ 648.456211] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 648.464398] print_req_error: I/O error, dev loop0, sector 24 [ 648.470236] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 648.477895] print_req_error: I/O error, dev loop0, sector 28 [ 648.483762] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 648.491454] print_req_error: I/O error, dev loop0, sector 32 [ 648.497274] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 648.504982] print_req_error: I/O error, dev loop0, sector 36 [ 648.510820] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 648.616963] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) 03:33:23 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) shutdown(r0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffff01, 0x0, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x11004, 0x0) 03:33:23 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000340)={0x38}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000200)) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x4, 0x0, 0x2000}, 0x4) r2 = getuid() ioprio_get$uid(0x3, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff}, 0x20) r3 = getuid() write$cgroup_int(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000380)={r4, 0x1, 0x6, @link_local}, 0x10) r5 = geteuid() setreuid(r3, r5) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:33:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 649.499229] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 649.652948] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x1}}, 0x0) 03:33:24 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x14002}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4014}, 0x80) 03:33:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000580)={0x1000}, 0x0) 03:33:24 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)='y\x00'}, 0x30) capset(&(0x7f0000000240)={0x20071026, r0}, &(0x7f00000000c0)={0x0, 0x80000000, 0x0, 0x0, 0x1000000000000, 0x8}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 650.633521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x1}}, 0x0) [ 650.764328] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:25 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x84) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='debugfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") fremovexattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7365c4d6fc618aa3d8c9080000004bc472b30609000000000000002340e98203"]) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/116, 0x74) ioctl$FICLONE(r0, 0x40049409, r1) 03:33:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x116) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) 03:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0af51f023c123f3188a070") write(r1, &(0x7f0000000340), 0x10000014c) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x3) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000000200)=""/1, 0x1}], 0x2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0), 0x4) [ 651.462091] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 651.476924] kauditd_printk_skb: 146 callbacks suppressed [ 651.476933] audit: type=1400 audit(2000000005.730:22271): avc: denied { map } for pid=17762 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 651.693855] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x1}}, 0x0) [ 651.837879] audit: type=1400 audit(2000000005.830:22272): avc: denied { map } for pid=17762 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:getty_exec_t:s0\x00', 0x22) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) [ 652.031936] audit: type=1400 audit(2000000005.870:22273): avc: denied { map } for pid=17762 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:26 executing program 5: clone(0x212005f7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) wait4(r1, 0x0, 0x0, 0x0) [ 652.179251] audit: type=1400 audit(2000000005.990:22274): avc: denied { map } for pid=17769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 652.253211] audit: type=1400 audit(2000000006.000:22275): avc: denied { map } for pid=17762 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 652.363422] audit: type=1400 audit(2000000006.010:22276): avc: denied { map } for pid=17769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 652.592991] audit: type=1400 audit(2000000006.020:22277): avc: denied { map } for pid=17762 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 652.712096] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 652.824863] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) 03:33:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 652.959303] audit: type=1400 audit(2000000006.070:22278): avc: denied { map } for pid=17769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:27 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000180)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty, 0x4}, 0x1c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) [ 653.153229] audit: type=1400 audit(2000000006.070:22279): avc: denied { map } for pid=17769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:27 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x27d, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x800) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f00000000c0)=0x8) r2 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000140)={0xfffffffffffffffc}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000180)=0x4) 03:33:27 executing program 0: setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x1015, 0x3, 0x7fff, "87462112a566b21fed916bc1f6ad5e5d", "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"}, 0x1015, 0x0) unlink(0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x875, 0x0, 0x0, 0x420000000000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="fabc1f023c02003188a070") [ 653.290547] audit: type=1400 audit(2000000006.100:22280): avc: denied { map } for pid=17769 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 653.647053] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 653.966910] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:28 executing program 5: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x2000)=nil) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x1, 0x8, 0x2, 0xffffffffffff1ea1, 0x0, 0x7fff, 0x1, 0x4, 0x7, 0x100, 0x8, 0x4, 0x4, 0x6, 0x3, 0x1, 0xfff, 0xfff, 0xfffffffffffffff7, 0x10000, 0x2, 0x401, 0x4, 0x80000001, 0x81, 0x44, 0xffffffff, 0x5, 0x1, 0x6, 0x8001, 0xfffffffffffff752, 0x330, 0x6800000000000, 0x4f9f, 0x47, 0x0, 0x10001, 0x6, @perf_config_ext={0x10001, 0x3}, 0x820, 0x8, 0x1, 0xd, 0x3, 0x7, 0x8}, r1, 0x10, r0, 0x1) 03:33:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) 03:33:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100), 0x0, 0x10, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_misc(r2, 0x0, 0x0) recvmsg(r3, &(0x7f0000000040)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, 0x0}, 0x0) 03:33:28 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000000)=0x702b7746, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ppoll(0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffe70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000700)={0x5, 0x45, &(0x7f0000000840)="72de6e917d898befe5fa789d270464b5daa0a6661b44b77016c3035e0d79bf6b18db5a446d2374c9ce0ed5d83c5acb07b779a7df3b3b0fcfb92c046b74d3766a6569a9473b"}) sendto$inet(r0, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc95ac1348db76ab634cf0fbde36acede0e45438773d28036919fd3c82e3622eb6f09975594f6bda43d29d0021a06e309383d903c1c4fd79f21eb35886e667dbe7", 0x69, 0x4008000, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}], 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = dup(0xffffffffffffffff) socket$inet6(0xa, 0x80f, 0x5) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001280), 0x10) recvmsg(r1, &(0x7f0000000680)={&(0x7f0000000380)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f0000000400)=""/182, 0xb6}, {&(0x7f0000000500)=""/88, 0x58}], 0x2, &(0x7f0000000580)=""/200, 0xc8}, 0x12000) [ 654.799662] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) 03:33:29 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x800, 0x80) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1TZ\x90\xd8H\xcd\xdb\xa2~\x00', 0x3802}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) [ 654.978985] print_req_error: 315 callbacks suppressed [ 654.978992] print_req_error: I/O error, dev loop0, sector 8 [ 655.242389] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x0, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:29 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x19a) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x802) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000480)) io_setup(0x1, &(0x7f0000000100)=0x0) io_cancel(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000340)="52983a60e8020db4ccd4543efead016afefdde6c22ebbdcb24ea7f7a421798f93ef99e121afdb83db4921ee0c3faedb276264d6a410d3a4d5a0d593ed3964fcad4ecb02541b0f7b79beb3e3b420a1fe921f950c8a1291b89f87077274c8394ad19985fd71c5f8f2cda957789b1d368b4358a6e17a10c410fe173d2c1ef906cce3b6431c16875b56e252b4b7b928532584e50b336f59f244791e5590e4aa6c81c96ad0b8860292411622a8e9e72196e1206de", 0xb2, 0x3f, 0x0, 0x3, r4}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f00000004c0), &(0x7f0000000500)=0xc) fallocate(r4, 0x3, 0x1000000005e89, 0xfff9) sendfile(r2, r2, 0x0, 0x3) unshare(0x40000000) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$void(r2, 0xc0045c79) ioctl$int_out(r4, 0x2, &(0x7f0000000540)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000001c0)={0x6c, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006340010000000000000000000000000000000000000000000000fe00000000000000f608db9ae2667bf95a0748794101e421b95a8aef4dcf5285c2ca53fabe8bbd2eec3b600e6b8518c2f5639cf21a0b6c0a722e624e6a715d31692d1946fbcc769ec9a33f05959377430e"], 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) [ 656.072915] print_req_error: I/O error, dev loop0, sector 0 [ 656.078862] buffer_io_error: 313 callbacks suppressed [ 656.078900] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 656.092329] print_req_error: I/O error, dev loop0, sector 4 [ 656.098143] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 656.106434] print_req_error: I/O error, dev loop0, sector 8 [ 656.112284] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 656.120182] print_req_error: I/O error, dev loop0, sector 12 [ 656.126073] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 656.134121] print_req_error: I/O error, dev loop0, sector 16 [ 656.139973] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 656.147773] print_req_error: I/O error, dev loop0, sector 20 [ 656.153682] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 656.161654] print_req_error: I/O error, dev loop0, sector 24 [ 656.167630] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 656.175450] print_req_error: I/O error, dev loop0, sector 28 [ 656.181370] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 656.189231] print_req_error: I/O error, dev loop0, sector 32 [ 656.195170] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 656.203028] Buffer I/O error on dev loop0, logical block 9, lost async page write 03:33:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) sched_getparam(r1, &(0x7f0000000140)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x200010005, 0x0) [ 656.386241] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 656.402947] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x1}}, 0x0) 03:33:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x0, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) [ 656.608310] kauditd_printk_skb: 95 callbacks suppressed [ 656.608319] audit: type=1400 audit(2000000010.860:22376): avc: denied { map } for pid=17882 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 656.739412] audit: type=1400 audit(2000000010.900:22377): avc: denied { map } for pid=17882 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 656.850193] audit: type=1400 audit(2000000010.930:22378): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 657.020350] audit: type=1400 audit(2000000010.940:22379): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 657.255680] audit: type=1400 audit(2000000010.960:22380): avc: denied { map } for pid=17882 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 657.378240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x1}}, 0x0) [ 657.505246] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 657.573903] audit: type=1400 audit(2000000010.990:22381): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x0, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) 03:33:32 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x13) sendto$inet6(r0, &(0x7f0000000140)="0204020003006000ebbed7f85c3b666e44b948835500000000ff00002000000007d9fbcf80398d537500000600791f301ee616d501000000000000d653c0e3850500000000000000", 0x48, 0x4044, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000080)) [ 657.841457] audit: type=1400 audit(2000000010.990:22382): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 657.994526] audit: type=1400 audit(2000000011.040:22383): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.135079] audit: type=1400 audit(2000000011.050:22384): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:32 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbff, 0xa04040}, 0xc) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000040)) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000200)={@local, @local}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) r1 = socket$inet(0x2, 0x7, 0x7) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') [ 658.332607] audit: type=1400 audit(2000000011.080:22385): avc: denied { map } for pid=17882 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x1}}, 0x0) 03:33:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x1}}, 0x0) 03:33:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 658.734285] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 658.752467] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e0000/0x1000)=nil, 0x1000) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r0 = memfd_create(&(0x7f0000000580)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) r2 = open$dir(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x7fffffffe, 0x0) finit_module(r3, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x80000000004) ftruncate(r2, 0x2008200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0xb6, 0x0, &(0x7f0000000200)="cdfbc072d9b632e85d76d76862be4a564ed6068d2e0596694f159e7e7897e02f0942a44ece4131a5983ab1e66a05aa824be8e34d177d312d9d6e0ffdfb9de6c3adfbb7db9cb55d169161644d92f15ff247fb6f1b727b943dbd7adb75d0317b141febb0df1e04f9fb064f73de3833dda6897e6352227da70680b9ce1e6ed24bfaca347810474682203b21d18ccdc276ec0ec9fc6eea59722e467688a2c9fbdf6b77dfb01016c6fd07609f6495d2e077ad8c8088149218", 0x0, 0x1000}, 0x28) ioctl$TCFLSH(r4, 0x540b, 0x5) r5 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 03:33:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x0, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 659.629896] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 659.792279] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) read(r0, &(0x7f0000000280)=""/76, 0x4c) r3 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="7e14eaa6386fce967ac3f6d7df039380d084650396a50e493046c40a8536d1781bd760ecf7e819771a39fe45d8ed4e7a7cdf0693486a14fc07603c562194a649f0255e73817c662e66a29406aa18be5c6ec984092c95e91171710b2a4e7405873db4686c22a7b9b7519de1425ff7cd", 0x6f, 0xfffffffffffffff9) keyctl$setperm(0x5, r3, 0x200000) 03:33:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:34 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x3000)=nil) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x301001, 0xc0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x4e21, @rand_addr=0x6}}) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) [ 660.631249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 660.778660] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 03:33:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x8, 0x20002) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:35 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) tee(r0, 0xffffffffffffffff, 0x9e, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') listen(r2, 0x0) r4 = accept4(r2, 0x0, &(0x7f0000000080), 0x0) socket$unix(0x1, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000000040)={@remote, @local, 0x0}, &(0x7f0000000280)=0xfffffffffffffe3b) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000002c0)={@rand_addr="d7b999364d27838af39687a3802eb0e9", 0x20, r5}) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000180)) [ 661.148494] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 661.631442] kauditd_printk_skb: 131 callbacks suppressed [ 661.631449] audit: type=1400 audit(2000000015.890:22517): avc: denied { map } for pid=17989 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 661.853127] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 661.958765] audit: type=1400 audit(2000000015.940:22518): avc: denied { map } for pid=17989 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.040878] print_req_error: 573 callbacks suppressed [ 662.040885] print_req_error: I/O error, dev loop0, sector 896 [ 662.108227] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 662.239049] audit: type=1400 audit(2000000016.300:22519): avc: denied { map } for pid=18007 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.404018] audit: type=1400 audit(2000000016.340:22520): avc: denied { map } for pid=18007 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.494911] audit: type=1400 audit(2000000016.350:22521): avc: denied { map } for pid=18007 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.614991] audit: type=1400 audit(2000000016.380:22522): avc: denied { map } for pid=18007 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.670214] audit: type=1400 audit(2000000016.430:22523): avc: denied { map } for pid=18007 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.744180] audit: type=1400 audit(2000000016.460:22524): avc: denied { map } for pid=18007 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.790438] audit: type=1400 audit(2000000016.470:22525): avc: denied { map } for pid=18007 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.860138] audit: type=1400 audit(2000000016.470:22526): avc: denied { map } for pid=18007 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000080)=0x114c, 0x4) 03:33:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="b70000000000000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x172f2) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x4) sendmmsg(r1, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000600)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)="15355467a9b05ac8a5bf96a56756c227571740ce5bb8d421213b956fa8caa5b0be08f7ca8e5c2a6ee12d982c5af962d1a8880528af940c689ae2794018f0c9dc52533fc5f974d82682f447fa327009b132cede820f0238bce77812c47c107f8e2d6e9e740a5b0de75cab56b86b6d9e2871d488ae6077cb54609f543ba524f988ac400cff4eff4e601ffe93730ce8c458e4df885b278473dd9c1b174c4f7f774207d8476fbe1f4ab6", 0xa8}], 0x1, &(0x7f00000005c0)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20, 0x4}], 0x1, 0x800) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 03:33:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x40, 0x7, 0xd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd}, 0x2c) 03:33:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r6 = dup2(r4, r0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, &(0x7f0000000300)=0x6) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) r7 = socket$inet(0x10, 0x3, 0x0) recvmsg(r7, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) sendmsg(r7, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) 03:33:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:38 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000100)=0x1) setresuid(0x0, 0xee01, 0x0) unshare(0x40000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x323d, 0x792, 0x9, 0x3, 0x0, 0x10000000000000, 0x40080, 0x4, 0xfff, 0x3, 0xc92, 0x3, 0x3907, 0x11, 0x4, 0x100, 0x7, 0x0, 0x7, 0x8, 0x5, 0xffff, 0x9, 0x9c, 0x6, 0x5, 0x6e0, 0x4, 0x2, 0x8f46, 0x5ddf, 0x371d96d7, 0x3ff, 0x1, 0xfffffffffffffffe, 0x9, 0x0, 0xec81, 0x4, @perf_config_ext={0x81, 0x6}, 0xa800, 0x664e, 0x9, 0x5, 0x9, 0x200, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:38 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x0) poll(0x0, 0x0, 0x400007f) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) getpeername$inet(r0, &(0x7f0000001180)={0x2, 0x0, @dev}, &(0x7f0000001280)=0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) rmdir(&(0x7f0000000580)='./file0\x00') [ 664.549718] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r3, 0x0, &(0x7f0000000200)='syz', 0x5b7, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000300)=0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={r1, r5, 0xa, 0x64e277bbdc0a9254}, 0x10) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 664.710467] print_req_error: I/O error, dev loop0, sector 128 03:33:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x260, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20008854) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000000c0)=0x0) sendmsg$unix(r4, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000240)="6efb9c8f008fedeffe255f377bd478c1171d4f7f9a8cc6a1b60f2008a386630817948a2a9b9379c2a21c1c6ae2e0fb2869e4afd316ed4cb00d8d07e189038a5699bf92de48256046eca89b1ebbbfb4dc6d499da996be2ef6c1d0c84a9b8ed7a2aff6664c19af2ebaef9fbc31b222cc1e55c2a60db9dee3b21fc75d788ae66c06bf9cd39c1f813da8f87d772a421d4d0c51a036f732a64ccab87bdee17a59c0c2f42393bbe4a7877d8875faf1ecdf3171509ce1dc742f250fbceec5a663bc9d880bf2dbeafefbe23750c13b57b650c28f3abca239a001dcfec1d5236123d4a31bbe1a9ba4f500a7a4e4", 0xe9}, {&(0x7f0000000340)="ac24331a6a368c65286058b69efeed583e6449d8dd7a7f2154abc846286ae03ee18e28f348bdbae24a8f55a83b4c87075275247dd40bd62a458bd9da002875f779c11638fa78556f9b0924a6874ede0d6f9bd9097f9af81f40934a200dc3600a5e134534ececae6fe55cceda4dbb63db1ecfe8d02c265e49b2ef3963b940100c6c6c5d322afef7129bc6dd1480a2461c9908fc93170686c058fbf3da86fcbe1a82510ed29f586921a61a70b9d4cf5abdd69dcd21bdbba767c032f34b05deb105a15dc393f875233a2e7265b2cad2e5211b5057887bb8ce8d22704f3d0a1b8f80705f3d1c74fadde6d6e73c6111b2601ad0e3caf2", 0xf4}, {&(0x7f0000000440)="4d15b94596d24105cc5a1b533d593862ea90e29cf6b8c634061ff1b60b95d35a59a7a27541d79fc738b7bad199a8e7b813ae4deb65ac628a36c21a9125510ba4e91627baa7041bccf5c2", 0x4a}], 0x3, &(0x7f00000004c0)=[@rights={0x30, 0x1, 0x1, [r0, r3, r4, r5, r5, r6, r4, r7]}, @rights={0x20, 0x1, 0x1, [r7, r6, r4, r3]}, @rights={0x20, 0x1, 0x1, [r5, r0, r7, r5]}, @cred={0x20, 0x1, 0x2, r8, r1, r2}], 0x90, 0x4}, 0x40810) 03:33:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10087) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x1, @link_local}, 0x2, {0x2, 0x4e22, @broadcast}, 'caif0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast1, 0x8, r1}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x8e, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/142}, &(0x7f00000003c0)=0x78) prctl$PR_GET_THP_DISABLE(0x2a) 03:33:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 665.451346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000800)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x40800000000003, 0x300) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x38082, 0x0) r3 = socket$packet(0x11, 0x40000000003, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000000)=""/49) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000280)=0x0) tgkill(r5, r6, 0x38) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2001, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000007c0)=@add_del={0x2, &(0x7f0000000780)='ip6gretap0\x00'}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000004c0)={'broute\x00', 0x0, 0x4, 0x86, [], 0x4, &(0x7f0000000240)=[{}, {}, {}, {}], &(0x7f0000000400)=""/134}, &(0x7f00000006c0)=0x78) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000200)) utimes(0x0, &(0x7f0000000540)={{0x0, 0x2710}}) sendmsg$TIPC_NL_MEDIA_GET(r7, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1002100}, 0xc, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1}}, 0x1) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000700)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000008c0)={&(0x7f0000000740), 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x38, r8, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x80) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000005c0)="020400006e00600000000000fff55b4202938207d9fb3780398d5375000006007929301ee616d5c01843e06590080053c0e385472da7222a2bb40100000042914c5e61eaa96fa9a1e8d1843e770afd6e9ef5837dbdeba97bc406eb04035ba1c331954421fe368d6376aa49676e68994664af1afe5e55c76fba4bf3a6bbaff7ae16f755d93a191988de36844a001fa3ba60b8815dd3c11ae64e27f8b4e448e679bb393e96cbf820e99b9f258402ce9331b754d78b47ea6aae382a7de3fdde676e6f52cd4f0024d8ae3b9c6b84dee78734cdbc", 0xd2, 0x47ffe, 0x0, 0x0) 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x6, @loopback, 0x7ff}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) [ 666.227785] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10087) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x1, @link_local}, 0x2, {0x2, 0x4e22, @broadcast}, 'caif0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast1, 0x8, r1}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x8e, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/142}, &(0x7f00000003c0)=0x78) prctl$PR_GET_THP_DISABLE(0x2a) [ 666.345492] print_req_error: I/O error, dev loop0, sector 0 [ 666.351683] buffer_io_error: 572 callbacks suppressed [ 666.351690] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 666.364639] print_req_error: I/O error, dev loop0, sector 4 [ 666.370412] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 666.378092] print_req_error: I/O error, dev loop0, sector 8 [ 666.383906] Buffer I/O error on dev loop0, logical block 2, lost async page write 03:33:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 666.391606] print_req_error: I/O error, dev loop0, sector 12 [ 666.397414] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 666.405143] print_req_error: I/O error, dev loop0, sector 16 [ 666.410989] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 666.418654] print_req_error: I/O error, dev loop0, sector 20 [ 666.424520] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 666.432223] print_req_error: I/O error, dev loop0, sector 24 [ 666.438031] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 666.445748] print_req_error: I/O error, dev loop0, sector 28 [ 666.451621] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 666.459316] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 666.467528] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 666.679760] kauditd_printk_skb: 178 callbacks suppressed [ 666.679769] audit: type=1400 audit(2000000020.930:22705): avc: denied { map } for pid=18105 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 666.759560] audit: type=1400 audit(2000000020.940:22707): avc: denied { create } for pid=18093 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:33:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) 03:33:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r3 = open(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r7, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r7) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r7], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x400, 0x0) write$apparmor_exec(r4, &(0x7f00000008c0)=ANY=[@ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=r2, @ANYRESOCT=0x0, @ANYPTR, @ANYRESDEC=r4], @ANYPTR=&(0x7f0000000300)=ANY=[], @ANYRES32=r4, @ANYBLOB="cfca2df7e8e54b5645e21f62498f030d726921694edb28a22ad4a4955c0205609ec1dc992f141db240fc9f8c0e5394c4e48f1aca0f1a1dc0be10672f7772bcbddc16053fbe6027a172765513a0c5c64dc96b8f1afc4cd88c8bc398b9f4e675b7826275518c20c0e8c5880baaeaa4b1bbcda26a691d9923bc6846a4378ea5df4a39fe95a9cadb04cdbe872f2bec29a9", @ANYRESHEX=r6, @ANYRES64=r5, @ANYRES64=r1, @ANYRESHEX=r1]], 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r3, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r6, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 666.960081] audit: type=1400 audit(2000000020.940:22706): avc: denied { map } for pid=18105 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 667.085422] audit: type=1400 audit(2000000020.960:22708): avc: denied { write } for pid=18093 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 667.236402] audit: type=1400 audit(2000000020.970:22709): avc: denied { map } for pid=18105 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 667.398943] audit: type=1400 audit(2000000020.970:22710): avc: denied { map } for pid=18105 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 667.606965] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:41 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f00000007c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x5, &(0x7f0000000640)=[{&(0x7f00000003c0)="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", 0xfb, 0x1}, {&(0x7f0000000280)="158708967230b852127e99f4f78b85fcf40116b2e05017d382eef9fc7fa3e57d771170ba49c960caf2833393e4d2fcce2e10ddb5518327f60d51de", 0x3b, 0x1}, {&(0x7f0000000300)="305b5df2dd73ad1f3089a9acc9befcd75818711e10efa0ef59e2e15c0ba4fca37664482106c27990bd50c4bc3edf6d642d6573df9b1417728d47a24906c29f32d1a6f34e8d6e90c12f5f4838490aa122141e41378ed4b14679342fd5f14fc33db93faa083c766324d79dca5704104a", 0x6f, 0x5}, {&(0x7f00000004c0)="117ee54d1db1fcea17bbdfeb240085fe70d962480e26e1d98591f0302b006f67d2bb2e7fd220ca2b3aa8136d0921c0a935bd822d9aa9df021bf2e865042d06a94db18ec857a8114bb2a6e4c94376576cb8efb7e1b3b9c440306acae522f6026e60a303d51ce045c68379abe395d3955bbd7514747aa820d548ddf84aba19d1abd0e6bfc68aa9068cdabf7aaff827fe89305095be68d3722a17593a7a5a9c560e213b6a588570deb04389669e8a5b8ad72ef56ae0fc691051f9d1b8db700cc7f24628", 0xc2, 0x3}, {&(0x7f00000005c0)="166c9b5290035fb1e22e9d16b2f2848774d182a76435a79f8886e92311d085660463a9b383d8abe2c728284df421fe3428975f9f73ac53a3c376ba92f63299c93be808d0b9a8dbc6d8f09246b5539a8a5736669e", 0x54}], 0x400, &(0x7f0000000800)={[{@nodots='nodots'}], [{@uid_lt={'uid<', r0}}, {@appraise='appraise'}, {@hash='hash'}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.upper\x00') setxattr$trusted_overlay_redirect(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 667.872233] audit: type=1400 audit(2000000020.990:22711): avc: denied { map } for pid=18105 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 668.152737] audit: type=1400 audit(2000000021.010:22712): avc: denied { map } for pid=18105 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10087) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x1, @link_local}, 0x2, {0x2, 0x4e22, @broadcast}, 'caif0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast1, 0x8, r1}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x8e, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/142}, &(0x7f00000003c0)=0x78) prctl$PR_GET_THP_DISABLE(0x2a) [ 668.431141] audit: type=1400 audit(2000000021.010:22713): avc: denied { map } for pid=18105 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.481032] print_req_error: 251 callbacks suppressed [ 668.481040] print_req_error: I/O error, dev loop0, sector 0 [ 668.492068] print_req_error: I/O error, dev loop0, sector 4 [ 668.497830] print_req_error: I/O error, dev loop0, sector 8 [ 668.503740] print_req_error: I/O error, dev loop0, sector 12 [ 668.509573] print_req_error: I/O error, dev loop0, sector 16 [ 668.515441] print_req_error: I/O error, dev loop0, sector 20 [ 668.521312] print_req_error: I/O error, dev loop0, sector 24 03:33:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378657320706f7369785f61636c5f6163636573017300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 668.527153] print_req_error: I/O error, dev loop0, sector 28 [ 668.533020] print_req_error: I/O error, dev loop0, sector 32 [ 668.538846] print_req_error: I/O error, dev loop0, sector 36 [ 668.566474] audit: audit_backlog=65 > audit_backlog_limit=64 03:33:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) 03:33:43 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0x0, 0xfffffff6, &(0x7f0000000400)='\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) r4 = epoll_create1(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r3, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) connect$packet(r3, &(0x7f00000003c0)={0x11, 0xf7, r5, 0x1, 0x4, 0x6, @dev={[], 0x11}}, 0x14) unshare(0x40000000) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) r7 = dup3(r4, r6, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'securitynodev}\x00'}, &(0x7f0000000140)=""/106, 0x6a) ioctl$PPPIOCGDEBUG(r7, 0x80047441, &(0x7f0000000000)) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 03:33:43 executing program 1: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, &(0x7f0000000400)) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x8004000, 0x0) clone(0x14013102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$setopts(0x4206, r2, 0x8, 0x48) r3 = gettid() wait4(0x0, 0x0, 0x80000002, &(0x7f0000000200)) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1d) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x2}, 0x28, 0x2) ptrace$cont(0x18, r3, 0x101, 0x7dc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) [ 669.306175] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) 03:33:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140)=0xda8, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10087) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x1, @link_local}, 0x2, {0x2, 0x4e22, @broadcast}, 'caif0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast1, 0x8, r1}) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x8e, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/142}, &(0x7f00000003c0)=0x78) prctl$PR_GET_THP_DISABLE(0x2a) 03:33:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000300)={0x7, 0x16, 0x1, 0x8, "5413cdf5e8902426ea433f3ff1befa7f0f49492f7feaad2febfb6f9308d2088a"}) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000a00)='vfat\x00', &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000008c00)={[{@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}], [{@smackfshat={'smackfshat', 0x3d, ']'}}, {@fsmagic={'fsmagic', 0x3d, 0x100}}, {@uid_gt={'uid>'}}, {@euid_gt={'euid>'}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x6, &(0x7f00000004c0)=[0xee00, 0x0, 0x0, 0xee01, 0xffffffffffffffff, 0xee00]) r4 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x2}, [], {0x4, 0x4}, [{0x8, 0x1, r1}, {0x8, 0x3, r2}, {0x8, 0x6, r4}, {0x8, 0x5, r3}], {0x10, 0x1}, {0x20, 0x2}}, 0x44, 0x1) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f00000005c0), 0x4) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000140)={{0x2, 0x4e22, @loopback}, {0x306}, 0x10, {0x2, 0x4e20, @multicast1}, 'bcsf0\x00'}) unlink(&(0x7f0000000000)='./file0\x00') r7 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r7, 0x7003) connect$unix(r7, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) prctl$PR_GET_CHILD_SUBREAPER(0x25) [ 670.209306] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:44 executing program 3: r0 = gettid() r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x401) prctl$PR_SET_FP_MODE(0x2d, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) exit(0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3e) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000000)=0x7, 0x4) close(r1) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) r4 = dup2(r2, r3) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) fcntl$setown(r4, 0x8, r0) accept4$inet6(r4, 0x0, &(0x7f0000000140), 0x80000) ioctl(r1, 0x2, &(0x7f0000000180)="4d532093db4d78f2cd5cfd2ab42c637264b22e0344fddb4a1a5919822c14221bf4f8dfb869745b2aba257e92c980b9c21b30bb35640d6ea9e0bd63d9f5a04b65a747939969bc93949f9cdca3c20eb6eb040fd9079a104c5d0bba9308822df433653c2b69bb8ecf1d79fe42f917ee6b4aaedb1a98b711ffb8ebc8cb866563c6211b683b295c31002801f2669eefad020f0f45c2886a02bf3ef27c0413a3ad814f0d908f4c4229d1f04b5d3dd11984fded81da9c6c92a4b72e655bb4461b767ca6") tkill(r0, 0x16) 03:33:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x0, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:33:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x21) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000000c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd9083899e3c217ad27803"], 0x1}}, 0x0) 03:33:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f00000003c0), 0x0, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@empty, 0xd68, 0x2, 0x3, 0x0, 0x5, 0x5e3}, 0x67) getsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000000080)=""/45, &(0x7f00000000c0)=0x2d) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) sendto$inet6(r0, &(0x7f0000000140)="58a4ad561dff48d1613a3e8faf397f58fb1d9796a920954de098fd92e866053fad457bc69dacbff78d62be45e44d1be98dc0e8da5c5e3899c4a48d66e830822861d8551e214b33ce4cf6c7c97dd384c2021bc407dd", 0x55, 0x80, 0x0, 0x0) r1 = request_key(&(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='syz', 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='&\x00', r1) keyctl$set_timeout(0xf, r2, 0x4) [ 671.202307] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x0, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, &(0x7f0000000400)) 03:33:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 671.702904] kauditd_printk_skb: 195 callbacks suppressed [ 671.702913] audit: type=1400 audit(2000000025.960:22880): avc: denied { map } for pid=18223 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:46 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x2) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801, 0x0, 0x3e88, 0x0, 0xe}, {0x801, 0x3, 0xa0008000, 0xfffffffffffffffe, 0x0, 0x8000000000000}]}) [ 671.920087] audit: type=1400 audit(2000000025.960:22881): avc: denied { map } for pid=18223 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:46 executing program 1: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x9, 0x5, 0x3) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20100021}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7ff}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$sock_ifreq(r0, 0x89ff, &(0x7f0000000440)={'bond0\x00', @ifru_addrs=@can}) [ 672.159757] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 672.257210] audit: type=1400 audit(2000000026.010:22882): avc: denied { map } for pid=18223 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x0, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785fe1634c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 672.488308] audit: type=1400 audit(2000000026.020:22883): avc: denied { map } for pid=18223 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000005c0)=""/4096) r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x5, @local, 0x4}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00', 0xfd}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000540)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) [ 672.637865] audit: type=1400 audit(2000000026.550:22884): avc: denied { map } for pid=18239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:46 executing program 3: r0 = socket(0x0, 0x80000, 0x8) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r1, 0x110, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4080}, 0x81) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/236, 0xec) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7f6}, 0x1c) [ 672.748810] audit: type=1400 audit(2000000026.560:22885): avc: denied { map } for pid=18239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 672.884972] audit: type=1400 audit(2000000026.590:22886): avc: denied { map } for pid=18239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 673.078647] audit: type=1400 audit(2000000026.630:22887): avc: denied { map } for pid=18239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 673.253136] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 673.543626] device lo left promiscuous mode 03:33:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000300), &(0x7f00000004c0)=0x0) ioprio_set$uid(0x800002, r1, 0x3ff) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0xffdffffffffffffc, 0x803) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 673.613161] audit: type=1400 audit(2000000026.680:22888): avc: denied { map } for pid=18239 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:33:48 executing program 1: setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000a40)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[]]], 0x1) r0 = socket$inet(0x2, 0x80003, 0x3) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x510, 0x4) getpeername(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x0, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xfffffffffffffffa}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) sendto$inet(r0, 0x0, 0xffffffffffffff5e, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) [ 673.871119] audit: audit_backlog=65 > audit_backlog_limit=64 03:33:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ppoll(&(0x7f0000000040)=[{}, {r1}, {r1}], 0x3, 0x0, 0x0, 0x0) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 674.579940] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:33:48 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = epoll_create1(0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfdc30) r3 = dup2(r2, r0) ioctl$TCSBRK(r3, 0x5409, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3d3) write$binfmt_elf64(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0xc9a) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x200, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000077c0)={0x0, @remote, @local}, &(0x7f0000007800)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4004) 03:33:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000140)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000000c0)=0x4) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) pread64(r4, &(0x7f0000000800)=""/190, 0xbe, 0x41) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f00000008c0)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 675.559413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002b40)='/selinux/mls\x00', 0x0, 0x0) pread64(r2, &(0x7f0000003680)=""/4096, 0x1000, 0x0) 03:33:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(r0, 0x0, 0x6068e96172fefb6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000002c0)=[{0x84}, {0x20000000000006}]}, 0x10) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000240)) quotactl(0xfff, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000300)="4bc744c72c357655580c5641e59467759556a8b28b24c66d552a5643255939be719052ee763e51cff983d55c71b2e21522c1518bafa7addfa80ce87a9b93ee897f036d7ff8b5b702f478bbd9770ec54963865ce0ad927bdb1d51a7cf9cde144fa1b80ae820df033c4ef3efc029741d49a68a085bffbf4a3c813260bddeaa68f6a1287efde5be06ce6d5b5e08289ac74f95f49a8ac7bf2ccdfaa02d8aad0db04186c147816cb3e70f431092a3d854dea1db12aae70e13cc1eccd88698a07d45e99e2cd908431c37b2a0c096a6b21949d633d8c99942e01255eb2409c36e8d3c7165858209ead002cfaf54585880") sendmmsg(r1, &(0x7f0000003040), 0x0, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='setgroups\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/161) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000140)="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") 03:33:50 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) r2 = getpgid(0x0) rt_tgsigqueueinfo(r1, r2, 0x27, &(0x7f0000000140)={0xa, 0x8, 0x8}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) chroot(&(0x7f00000000c0)='./file0\x00') r3 = gettid() request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) tkill(r3, 0x11) wait4(0x0, 0x0, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000100)=0x2, 0x4) ptrace$poke(0x4, r3, 0x0, 0xfffffffffffffff8) ptrace$getenv(0x4201, r3, 0x8, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) prctl$PR_SET_PTRACER(0x59616d61, r3) 03:33:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:33:50 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x403, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x18, 0x0, 0x743a}) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/117) 03:33:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$LOOP_CLR_FD(r1, 0x4c01) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369787661636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 676.914603] print_req_error: 251 callbacks suppressed [ 676.914611] print_req_error: I/O error, dev loop0, sector 0 [ 676.925799] buffer_io_error: 508 callbacks suppressed [ 676.925807] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 676.938791] print_req_error: I/O error, dev loop0, sector 4 [ 676.944552] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 676.952257] print_req_error: I/O error, dev loop0, sector 8 [ 676.958008] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 676.965706] print_req_error: I/O error, dev loop0, sector 12 [ 676.971578] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 676.979244] print_req_error: I/O error, dev loop0, sector 16 [ 676.980248] kauditd_printk_skb: 258 callbacks suppressed [ 676.980256] audit: type=1400 audit(2000000031.180:23106): avc: denied { map } for pid=18363 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 676.985081] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 676.999226] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 677.012816] print_req_error: I/O error, dev loop0, sector 20 [ 677.034873] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 677.040983] audit: type=1400 audit(2000000031.180:23107): avc: denied { map } for pid=18363 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.042577] print_req_error: I/O error, dev loop0, sector 24 [ 677.070639] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 677.078296] print_req_error: I/O error, dev loop0, sector 28 [ 677.084167] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 677.091867] print_req_error: I/O error, dev loop0, sector 32 [ 677.097674] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 677.105404] print_req_error: I/O error, dev loop0, sector 36 [ 677.111244] Buffer I/O error on dev loop0, logical block 9, lost async page write 03:33:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) [ 677.570334] audit: type=1400 audit(2000000031.230:23114): avc: denied { map } for pid=18363 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 677.650753] audit: type=1400 audit(2000000031.330:23115): avc: denied { map } for pid=18360 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:52 executing program 3: setrlimit(0x8, &(0x7f0000a9cff8)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 03:33:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) 03:33:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340), 0x1, 0x881806) r1 = getpgid(0xffffffffffffffff) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x46, 0x1) r2 = syz_open_procfs(r1, &(0x7f0000000180)='attr/exec\x00') getpeername$netlink(r2, &(0x7f00000002c0), &(0x7f0000000380)=0x8) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "3305c43c9bb9bd99cd611f0236a42e8525aea060"}, 0x15, 0x3) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000240)) fcntl$lock(r0, 0x25, &(0x7f0000000080)={0x1, 0x3, 0xff, 0xffff, r1}) read(r0, &(0x7f0000000000)=""/30, 0xfffffe4c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x8031, 0xffffffffffffffff, 0x0) [ 678.373208] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320700ef069785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000300)=0x0) ptrace$setregs(0xf, r6, 0xffffffff80000000, &(0x7f0000000800)="f12212265c6778a7fa559454240e79535bd330dc0ee65f7ec947c556477fcc19d8e36eddc70547bd49260d07b4374ad1a1ccf6d297352a5f4f290bffb4b5c85066cce3639bc67295c3467edbfe3e0eedd452aa731ad66ac6af7d1456ffc1ef2b352decefaa4c7d52cc2c7d5d2bd1139e38488e857f40cf96dcf1f4d948d0dfd05e164cde9174c78d01ef823a79440875aa8dc1349238225b18981e88ed96a7bc6c99db4b3d124f6c6215f7ee21c19701514b8d23f0c56b852186d2796b") ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0xffffffffffffff5d, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[], 0x1}}, 0x0) 03:33:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:53 executing program 1: syslog(0xa, &(0x7f0000000000)=""/54, 0x36) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dmesg_exec_t:s0\x00', 0x22, 0x2) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x1, 'bridge_slave_1\x00', 0x3}, 0x18) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000180)=0x2, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40001) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)=0x0) r3 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x8, 0x9, 0x3, 0x6, 0x0, 0x6, 0x60410, 0x4, 0x1ff, 0xfff, 0x8, 0xe4, 0x5, 0x787a, 0x8001, 0x3, 0x9, 0x0, 0x80000000, 0x81, 0xe9f8, 0x100, 0x0, 0x7, 0x5ce, 0x80000001, 0x7ff, 0x8, 0x6b, 0x0, 0x2, 0x100000000, 0x2, 0x3, 0x7, 0x7fffffff, 0x0, 0x7, 0x4, @perf_config_ext={0x3, 0x1}, 0x0, 0xd2, 0x6, 0x8, 0x3, 0x81, 0x1}, r2, 0x4, r0, 0x8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000003c0)=0x12, 0x4) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000400)={0xc023, 0x2}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockname$unix(r0, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) fcntl$setownex(r0, 0xf, &(0x7f0000000500)={0x0, r2}) sched_setparam(r2, &(0x7f0000000540)=0x451) ioctl$int_in(r0, 0x2598532cb49967d9, &(0x7f0000000580)=0x100000000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000005c0)=0x4, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0xfffffffffffffffe, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000640)={0x43, 0x9, 0x1, {0xc72e, 0xff, 0x7ff, 0x1000, 0xffffffff0, 0x80, 0x1000, 0x2, 0x20}}, 0x43) r5 = open(&(0x7f00000006c0)='./file0\x00', 0x2, 0x10c) openat$cgroup_ro(r4, &(0x7f0000000700)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000740)=@known='user.syz\x00', &(0x7f0000000780)=""/30, 0x1e) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000007c0)="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") setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000900)={'broute\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f00000008c0)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) write$input_event(r4, &(0x7f00000009c0)={{}, 0x11, 0x8, 0x3624f88c}, 0x18) ioctl$RTC_ALM_READ(r5, 0x80247008, &(0x7f0000000a00)) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a80)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x104044}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7aef}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7efa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0xf927b5673539edfc}, 0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r5, 0x50, &(0x7f0000000c00)}, 0x10) 03:33:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000000270000128b0000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 03:33:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) 03:33:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 679.502474] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:54 executing program 3: r0 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1, 0x1008) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0xfffffffffffffffa, &(0x7f00000001c0)='./file0\x00', r3, &(0x7f00000005c0)="bbb717727a229e9a464f95b572cc6a18ed581c67d9279b13c22f7fe98e932a30fb7c1bc5d33ba0e60e6d923e3d9c6db7f54884a7638f6a25d6cd201c8b32fa0f3367e96ef617c5f5ca3d8664f6ea4e3108bca871de0528ade288cbd7e4147c759bda1f652f351755c8") r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x4, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000180)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x7, &(0x7f0000ffb000/0x2000)=nil) syz_open_pts(r0, 0xfffffffffffffbc) symlinkat(&(0x7f0000000500)='./bus\x00', r1, &(0x7f0000000540)='./bus\x00') mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0x6, 0x0, &(0x7f0000000480)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) fallocate(0xffffffffffffffff, 0x4, 0x9, 0x4003fd) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000004c0)='dctcp-reno\x00', 0xfffffffffffffd63) fallocate(r1, 0x20, 0x0, 0x0) unshare(0x40000000) fadvise64(r0, 0x0, 0x80000000000083, 0xfffffffffbffffff) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/netfilter\x00') write$UHID_INPUT2(r6, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="e5988bb4e1e2abeb4bf216fbd7a2612fee89cfbd0445419d4793ef62bd021a7ac459a0cb21fc4df15ca129037a9cc219273921dcd8388ce9a57042b7efb6578880df4c04c63dcde5646df794f424dc120f7ed668d1b691ce40862633eccb0804765e38015c7789b7c0dd0a3f7d7cc1ae1b8032c7e02b1b5b55bfe7af178690fa546408e9fd0301097ad2dead72da59ec9871faf09b0d42125850e6d4ba8edfaf16d8d32a8a6d6ed04f2b4200f745849b04e249797bf3fa56fe4f51c16ef72bcac3a8f57e8853845d", @ANYRESOCT=r4, @ANYRES32=r2, @ANYRESHEX=r2]], 0x1) 03:33:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup2(r1, r0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f00000002c0)=0x4bfd9a6b) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1, 0x0) rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f00000000c0)="c4e2013bb4e0dd000000c42219913cdcf01069000f02fdc4228d966ff2c4a1d9d34b7cc482e1beeec402658e610e46d2f9c4c1791007", {}, 0x50000000, &(0x7f0000000100)="c4024d2e4ce00066660f3830485ac481fd709da53f99270326f240a565f00fba2bfec462092d9f000000003e3e400f2e2a400ff574300fc463f10c69000040d9dd"}, &(0x7f0000000240)={&(0x7f00000001c0)="8f09f89acf388c0299899999422a8100000000f2a436d9edc4c2adaec28fc818ccd13ef30f5d661e660f38036c78858014f000", {}, 0x0, &(0x7f0000000200)="66430f67a896834cf7650f2fa90c000000c4c26d9745aaf20f2b02676443c0e590664b0f3a1658f18142dde5f00fc78f00000000642edb4d00365f"}, 0x8, &(0x7f0000000280)) 03:33:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) 03:33:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163ff0f00000000000043f45819ec644804ba766c911e106b31bd1156f7c54e77bc43ef2df90a1c8008d7f2aede50814b827f16161c92c8679f0662f368f7980b0ff38e0d3a09d20ff0763e4faef503ce36bfd3b8"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2, 0x3}, 0x8) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000800)={{0x0, @remote, 0x4e23, 0x1, 'sed\x00', 0x0, 0x0, 0x5f}, {@multicast1, 0x4e22, 0x2, 0x80000001, 0x3f, 0x6739}}, 0x44) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 680.765068] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:55 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x3a) connect$inet6(r0, &(0x7f0000000a40)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0xfffffffffffffffc, 0x1, 0x4, 0x73, 0x2}, 0xc) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 03:33:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz1\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(r1, &(0x7f00000000c0)=@random={'os2.', '-\'{\x00'}, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x18, 0x1) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 681.677109] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) r2 = dup2(r0, r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r3 = fcntl$getown(r2, 0x9) perf_event_open(0x0, r3, 0x1, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000580)) getpgrp(0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/context\x00', 0x2, 0x0) capget(&(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x4000000) preadv(r4, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:33:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000800)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) [ 681.987226] kauditd_printk_skb: 154 callbacks suppressed [ 681.987235] audit: type=1400 audit(2000000036.240:23270): avc: denied { map } for pid=18492 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.063400] input: syz1 as /devices/virtual/input/input23 [ 682.142978] input: syz1 as /devices/virtual/input/input24 [ 682.179285] audit: type=1400 audit(2000000036.320:23271): avc: denied { map } for pid=18492 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.295402] audit: type=1400 audit(2000000036.320:23272): avc: denied { map } for pid=18492 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.418760] audit: type=1400 audit(2000000036.340:23273): avc: denied { map } for pid=18490 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:56 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setregs(0xf, r0, 0xce1, &(0x7f0000000200)="b3576b3d2c3e4bb5d9ecef2da419497996d7cc5365027f5cedf3296ce4b958c8b816aaaabd084aa61a4de132ab554a32560e67c0645a07be4e3273b8015f7db88e926e9058f1cc119db05d9891eb03e98b5689f28b7289aa9940d21f9c56786a58ae4cfc6cab15d7601f52037e16f47b17d3db3ad8198ba86542eaab2819328a886ea9e7915b34f80c22f1095443306fa2d8e334103f398d315ef79dcd3fd73b6f2ab863a9fe0a96") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$getsig(0x4202, r1, 0x8001, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f00000001c0)) fcntl$setlease(r2, 0x400, 0x3) tkill(r1, 0x1c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000140)={[], 0x2, 0x9, 0x61a, 0x5, 0x2, r1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 682.593887] audit: type=1400 audit(2000000036.340:23274): avc: denied { map } for pid=18490 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.648245] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 682.765487] audit: type=1400 audit(2000000036.340:23275): avc: denied { map } for pid=18490 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.940187] audit: type=1400 audit(2000000036.390:23276): avc: denied { map } for pid=18492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.141027] audit: type=1400 audit(2000000036.390:23277): avc: denied { map } for pid=18492 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.313247] audit: type=1400 audit(2000000036.430:23278): avc: denied { map } for pid=18490 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.450181] audit: type=1400 audit(2000000036.430:23279): avc: denied { map } for pid=18490 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = syz_open_procfs(r1, &(0x7f0000001240)='net/udp\x00') ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000001140)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x2, 0x80000000, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x96f, 0x1000, &(0x7f0000000080)=""/4096}, 0x48) 03:33:58 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x100000003, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000180)={0x4, {{0x2, 0x4e20, @multicast2}}}, 0x88) openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x42c00, 0x0) pipe(&(0x7f0000000140)) ioctl$RTC_UIE_OFF(r0, 0x7004) clock_gettime(0x6, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 03:33:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x0, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) 03:33:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='clp\xf9\xeb\x9e\x0f\x00\xa9rgX\xa0\x03h\xbb\x84\xd9\xb3\x06\f\xc8-\xba \xc8nE6s\x957\x01\xeaay+tj\xdc\x1a\xeb\xc2s>>3\xd1\x8c\xf8_\x91g\x82\x10i>\xdcb)[\x83!z|xf\x9f\x7f\xa9\x92\xbc\x05=\xcb\xac\xda\xfc\x02\xdcw\xf9jck<$K\x00Q\xf6\xff\x7f\x00\x00\xefo\x1a\xda\xd5\xceU\xf3\x89Z\x01\xc2p\xfaa\xcc\x19\r\xbc\x82\x82*0\xa8U\x19\x8c\tnN\xff@\xa2\x04\x02\x06\x00;|\xf4\xe8\xd9>]=as\x86\xfbQfSQ`Z\xd0Wh\x88Sa\x14\xc2\xd6\xfd\x1b\xcb\x9c\xab\"m\xae\x12\xce\xd9\xe9\xe0\xe4%\xd5Y`\xe7\xe7\xf4\'\xc8\xbd0\fzjF\xceV\x975xf\xed\a\xee\x96\xa8\xa4\x8c\xb2\x97\xfaJ\xcd>\xcf\xa5}\x00\x00\x00\x00\x00\x00\x00\x00\x18\v\xb4\f-g;\th\xb2\xd1\xe9@\xa6\a_\xddG\xbd\xe7\x8f\x98Y\xbf{[\x18\xa2\x7f\x92\r\xadv\x14\xf0m\akn\xc3E\'p\x84\x8d\xaf\x84\xdeo\xd6Q}\xc6{\xbeD\xde\x8d3A\x9bhg\xb4O\xee\xcf\x80\xa0f\xbe\x923_\x9a\xb7\x1d\xe6\xc8\xbc\xcbQ\xfb$\x853\xef\x8f\xe0\\O\x9f\xb1\xe2\xfb\xbb\x1b\xb4m6\xf3\xe5(D3\x85q\x11\xa6b\x01\x15\x87\xd9\x9a\x0f\xe7\x1d_\rn\xf3\xa7\xce\tW\xec', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b80)={0xffffffffffffffff}) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x80100, 0x2) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f0000000100)=""/17, 0x11) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffffffff80000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xa1, 0x62, &(0x7f0000000140)="db64bd2660c609c1de94a33b9fcd28649b6528df3811b942d1080829d3c12a568917861cdecf3a3f0cffe7daafb38dd85633e0fbd440571e5c442c728be5fedef5c28cf5d68d7286c05e3b63374bd8135ea0e2cd1872cfa5372a89db96ea35b3f4279839c9932053d3fe702c98aa4e09d73b5422b136a423407b6a112c21183b2b5b3f9bb982158a3f3efc5ea7d215bc2bd16703b745b0b792f555e51fe2d3e372", &(0x7f0000000200)=""/98, 0x3}, 0x28) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x1) r5 = request_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='com.apple.FinderInfo\x00', 0xfffffffffffffff8) r6 = add_key(&(0x7f0000000680)='user\x00', &(0x7f00000006c0)={'syz', 0x0}, &(0x7f0000000700)="f45b9656003104098b5d119fb79b0fea7ca3fdde30a498d7150af99f852c7ee8079201a86a86b8caecaf3538979b213e4c6b639ab03ac88e14120e0b1622f8747a84ed3fde5e2ffb145ccd7083717fa57359e8391c91b15e2a7a7936881894ebde531bdaf429a76178fd556d313c", 0x6e, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, r6) 03:33:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) setns(r2, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000640)=""/36, &(0x7f00000007c0)=0xffffffffffffff23) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140001004fc99f5a57a86c6e0d97a79f243600000000000000000000000000"], 0x1}}, 0x0) [ 684.283285] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000440)="70425f82ddbec52c", 0x8, 0xffffffffffffffff) keyctl$update(0x2, r5, &(0x7f0000000480)="7e53b60e40d3a035ec75753c4efefd3dc623ace3a180181bc85af6eeadc7f7d918367df29bb67dc8855b73445450ca755fe5bf76464bf4c32345db46b67a99901277ac71ec7e863620165dd1ee6e4e674c2d2a", 0x53) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="837865c420706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r6) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000800)={0x0, {0x2, 0x4e20, @rand_addr=0x80000000}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x28, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='ip6gre0\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="140001004fc99f5a70cd23837a0400000013000000000000000000000000ffff97ff"], 0x1}}, 0x0) 03:33:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80800) listxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=""/78, 0x4e) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000002c0)={{0x5e, @remote, 0x4e21, 0x2, 'rr\x00', 0x1, 0x3aa6, 0x45}, {@rand_addr=0x5, 0x4e22, 0x2000, 0x1, 0x0, 0xfffffffffffff801}}, 0x44) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x387) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x6, @local, 0x4}, 0x3d) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) fcntl$setsig(r1, 0xa, 0x33) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x20) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$selinux_load(r6, 0x0, 0x0) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) fstat(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) r10 = geteuid() r11 = getgid() setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="02000000010002000000000002000400", @ANYRES32=r7, @ANYBLOB="02000300", @ANYRES32=r8, @ANYBLOB="3ea509627581c683d2b752a6ebcf5e137babf6fd7f26a1d15364fd566ffca67ed6620cfbbf43ac9d55fb922f7e95ef8615eb6af7ddb2816420301cf3badd7c02cb9b0b27f91df500fb91b768b135328b57605238c5d51f4c61f463354c9236d98626414386fec0d3bdba007019b360842ca13e2d1e2816a90debf2e3ce1400", @ANYRES32=r9, @ANYBLOB="02000400", @ANYRES32=r10, @ANYBLOB="040004000000000008000600", @ANYRES32=r11, @ANYBLOB="10000200000000002000020000000000"], 0x4c, 0x3) 03:33:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:33:58 executing program 1: futex(&(0x7f0000000500)=0x10000002, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x1, 0x400000000000000) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80280, 0x7) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x8000, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="00800000000000000400000000008057bb1c8fa83be0daf6a70fd1e3b5096d44a84b0530cb085652b06c08faccb811de3af6a488c3157a1de7a6497b72c4996970e22a80dabc5a23fe551ad875925256944e266091d6457e169ff192872669edb34d2c0000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r5, @ANYBLOB="00000000050001000000000000000000000000000000000000000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) futex(&(0x7f0000000080), 0x6, 0x1, &(0x7f0000000100)={0x400000000}, 0x0, 0xfffffffffffffffe) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x6c000, 0x0) getsockopt$sock_int(r7, 0x1, 0x3f, &(0x7f0000000200), &(0x7f0000000400)=0x4) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) fchmodat(r8, &(0x7f0000000180)='./file0\x00', 0x9) [ 684.511923] print_req_error: 509 callbacks suppressed [ 684.511931] print_req_error: I/O error, dev loop0, sector 128 03:33:59 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x2, &(0x7f0000000080)) sched_setscheduler(0x0, 0x4000000001, &(0x7f0000000200)=0x8) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x3, 0x4, 0xfffffffffffff000, 0x0, 0x3}, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) ppoll(&(0x7f00000004c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) syz_open_procfs(r0, &(0x7f0000000040)='net/if_inet6\x00') vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd"], 0x3}}, 0x0) [ 685.622537] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e27, 0x0, @rand_addr, 0xb2}, 0x1c) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x3, 0x0, 0x8000, 0x6, 0x8}, 0xc) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x101, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) 03:34:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x22c, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:00 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) r1 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) unshare(0x2000000) r2 = creat(0x0, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000000)={@empty, @dev, @remote}, &(0x7f0000000080)=0xc) dup2(r1, 0xffffffffffffffff) syncfs(r1) [ 686.465669] print_req_error: I/O error, dev loop0, sector 128 [ 686.468846] print_req_error: I/O error, dev loop0, sector 0 [ 686.471723] print_req_error: I/O error, dev loop0, sector 4 [ 686.477381] buffer_io_error: 508 callbacks suppressed [ 686.477390] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 686.483207] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 686.488358] print_req_error: I/O error, dev loop0, sector 8 [ 686.496013] print_req_error: I/O error, dev loop0, sector 12 [ 686.503613] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 686.509306] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 686.515122] print_req_error: I/O error, dev loop0, sector 16 [ 686.515131] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 686.522781] print_req_error: I/O error, dev loop0, sector 20 [ 686.522790] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 686.522808] print_req_error: I/O error, dev loop0, sector 24 [ 686.530664] print_req_error: I/O error, dev loop0, sector 28 [ 686.536431] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 686.544054] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 686.544080] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 686.549874] Buffer I/O error on dev loop0, logical block 9, lost async page write 03:34:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x6, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x78, r3, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8ed}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xefe}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x48ee}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffff81}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xe0}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xc1}, 0x8010) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="24000000110007031dfffd946f610500810000000500000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1, 0x0, 0x125}, 0x0) write(r0, &(0x7f0000000300)="ce7836f2a31b3ec9f54a911dbd6cf3d824f9273a562e0304094355e8061eb3bd5cf62328609cc00e22e0a3c189d740e9c74f6c7026335a641c678499aedc43366e2b06c2ea611f9cb1d8904084efcb854543a38d6a9326b092842faea1f7399bdff97ca4401a894fff789125b5dfc067e50b8a977414ba302cdd", 0x7a) 03:34:00 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fcntl$notify(r0, 0x402, 0x40000000024) lseek(r1, 0x0, 0x3) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 03:34:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd"], 0x3}}, 0x0) [ 687.108334] kauditd_printk_skb: 122 callbacks suppressed [ 687.108341] audit: type=1400 audit(2000000041.360:23402): avc: denied { create } for pid=18605 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:34:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_tcp_buf(r2, 0x6, 0x1c, 0x0, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) 03:34:01 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) r2 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) r4 = getegid() getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) getgroups(0xa, &(0x7f00000003c0)=[0xee00, 0x0, 0xee01, 0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {0x1, 0x1}, [{0x2, 0x3, r1}, {0x2, 0x5, r2}, {0x2, 0x4, r3}], {0x4, 0x6}, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x7, r6}, {0x8, 0x3, r7}], {0x10, 0x4}, {0x20, 0x5}}, 0x5c, 0x2) clone(0x210007f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000fff90003e2f490ad270800204000000000ff01"], 0x27) 03:34:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) r9 = getuid() r10 = getuid() fstat(r6, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = geteuid() stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = geteuid() fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() r17 = getgid() getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)=0x0) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000dc0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x5, r8}, {0x2, 0x0, r9}, {0x2, 0x1, r10}, {0x2, 0x7, r11}, {0x2, 0x6, r12}, {0x2, 0x1, r13}, {0x2, 0x2, r14}, {0x2, 0x2, r15}], {0x4, 0x4}, [{0x8, 0x2, r16}, {0x8, 0x1, r17}, {0x8, 0x1, r18}, {0x8, 0x1, r19}, {0x8, 0x2, r20}, {0x8, 0x3, r21}], {0x10, 0x1}, {0x20, 0x1}}, 0x9c, 0x3) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 687.308364] audit: type=1400 audit(2000000041.370:23403): avc: denied { write } for pid=18605 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 687.338546] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 687.422326] audit: type=1400 audit(2000000041.490:23404): avc: denied { map } for pid=18615 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 687.526415] audit: type=1400 audit(2000000041.500:23405): avc: denied { map } for pid=18615 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:01 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaa58ef01968185ad8f000800450000703bc57bb933af8fb2f20000000000019078ac2314bbac1414110804907800000900006900000000000000000000ac2314aaac14140060d98549ceb458c7947f482ada715abcad2b0df850b9078d385e921beb81ef63428ef23ff380323d6182106c8b49ba3c9b3bda50d254ca407327c2a2ec2d784d1393f0b2d872c414d61851a6034e34f25f5adbb3e5cb9488edafd8c7c7121629937ff106ba1a03dd0fd74062a0762c495e6350b4fc381cbc6b34caeec7fa24934cd9f801659922ec5997a15e4100da89d4be2842b6002ef835864d4513f7270000000000000000000000000000"], 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x442000, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x400, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, r1) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', r2) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000740)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpgrp(r3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r5}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x0, 0x3ff, 0x8001}) r6 = socket$inet6(0xa, 0x400000000001, 0x0) r7 = dup(r6) fsync(r4) ioctl$ASHMEM_SET_PROT_MASK(r7, 0x40087705, &(0x7f0000000280)={0x100000000}) fcntl$lock(r4, 0x7, &(0x7f0000000840)={0x3, 0x1, 0xffffffffffffffff, 0x89, r3}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r7, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9005b2e2903904e622869", 0x83, 0xf, 0x0, 0x0, r7}, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r7, r9, &(0x7f0000d83ff8), 0x8000fffffffe) setsockopt$netlink_NETLINK_TX_RING(r9, 0x10e, 0x7, &(0x7f0000000700)={0x5, 0x288b, 0x0, 0x72}, 0x10) [ 687.660533] audit: type=1400 audit(2000000041.510:23406): avc: denied { map } for pid=18615 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 687.999846] audit: type=1400 audit(2000000041.520:23407): avc: denied { map } for pid=18615 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:02 executing program 3: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, "daa46942eda9bbcb2ea4e8d4d31ade06ea2fc6b0a6f3b6b15918706c377d902c"}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)=""/206, 0xce}, {&(0x7f0000000000)=""/10, 0xa}, {&(0x7f0000000240)=""/146, 0x92}], 0x3, 0x0) iopl(0x5) socket$netlink(0x10, 0x3, 0x12) [ 688.379683] audit: type=1400 audit(2000000041.560:23408): avc: denied { map } for pid=18615 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 688.453087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r1, 0x0, &(0x7f00000000c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0xffffffffffffff28, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd"], 0x3}}, 0x0) 03:34:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x8) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000004c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 03:34:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 688.623284] audit: type=1400 audit(2000000041.610:23409): avc: denied { map } for pid=18615 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 688.772563] audit: type=1400 audit(2000000041.610:23410): avc: denied { map } for pid=18615 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 688.936292] audit: type=1400 audit(2000000041.650:23411): avc: denied { map } for pid=18615 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 689.411327] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x3}}, 0x0) 03:34:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x4, 0x4) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=ANY=[@ANYBLOB="e3811899b4d009911d3a239f3c2c6173433de95417be758879a1316eb651c92a012dbbd315d6902226e12f21d6a3e10f0d6cbd9e1bfd766eb16219201b9693"], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x20000000) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r1, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000300)) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 03:34:04 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xe800, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x85, 0x3, 0x5}}, 0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = getgid() setresgid(r2, r3, r4) lseek(r1, 0x8, 0x2) 03:34:04 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x21003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) clone(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:34:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'teql0\x00', 0x1020000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x12) [ 690.173079] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x54}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x99, &(0x7f0000000240)=""/153}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="24000061595606342340b504000000000000000008", 0x15}], 0x1}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000080)}, 0x10) 03:34:04 executing program 3: setxattr$security_selinux(&(0x7f0000000340)='.\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000200)='system_u:system_r:kernel_t:s0\x00', 0xfffffffffffffe66, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000000c0)) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000280)={0x7, 0x33, 0x2}, 0x7) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000240)=0x68) 03:34:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)={0x228, r6, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe7d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa3f1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0x29}, 0x5fb}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x4}}, 0xe}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xaf}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3, @local, 0x5beb}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc76}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x1}, 0x40814) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x3}}, 0x0) 03:34:05 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v2={0x5, 0x1, 0x2, 0x3a9, 0x2f, "f78f2e6d0d5dc377e1a323b66cdf5cac5c2bae0c492b6bea6bcdb8417b848f0bc8c85b20a6ee28c28b5afa5c333541"}, 0x39, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000100)={@rand_addr="58e5150a90fe3f09c50bca819cce76e0", r2}, 0x14) ioctl$VT_WAITACTIVE(r1, 0x5607) 03:34:05 executing program 3: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000200)={@empty, @empty}, &(0x7f0000000280)=0x8) mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) r1 = getgid() setfsgid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xb, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e22, 0x1, @remote, 0xee30}}, 0x0, 0x401, 0x0, "40b5048c6649757628e3c67a63dbd8d336c272c56c0ad68c5c10212c1f46dcb69ac86866e74e03459171f5454f81e1bd9d1929f4c47a4c3da1ebcd036b72f6ca68d11d79c4139e9869347cd5f6384c7a"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000240)) r3 = open(&(0x7f0000000000)='./file0\x00', 0x101002, 0x100) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6000, 0x100) 03:34:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x2) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x10000000b, &(0x7f0000000280)=0x2, 0x10f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) sched_setattr(r3, &(0x7f00000003c0)={0x30, 0x7, 0x1, 0x7, 0x9c, 0x40, 0x1, 0x8c400000000000}, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000180)={0x5, 0x48, 0x2, 0x971b}) r4 = socket$packet(0x11, 0x0, 0x300) setsockopt$inet6_tcp_int(r1, 0x6, 0x34, &(0x7f0000000300)=0xa, 0x4) ioctl$TIOCNXCL(r0, 0x540d) mlock2(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1) ioctl$TIOCNXCL(r0, 0x540d) getsockopt$inet_tcp_buf(r2, 0x6, 0x3f, &(0x7f0000001440)=""/147, &(0x7f00000001c0)=0x93) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) bind$packet(r4, &(0x7f0000000540)={0x11, 0xff, r5, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) connect(r2, &(0x7f0000000340)=@ipx={0x4, 0x10001, 0x483, "8f2ee10b7702", 0x20}, 0x80) r6 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) pread64(r2, &(0x7f0000002580)=""/4096, 0x1000, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) perf_event_open(&(0x7f00000012c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x699, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 691.616142] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 691.692358] print_req_error: 24 callbacks suppressed [ 691.692369] print_req_error: I/O error, dev loop0, sector 0 [ 691.703359] buffer_io_error: 22 callbacks suppressed [ 691.703366] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 691.716189] print_req_error: I/O error, dev loop0, sector 4 [ 691.721947] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 691.729621] print_req_error: I/O error, dev loop0, sector 8 [ 691.735417] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 691.743114] print_req_error: I/O error, dev loop0, sector 12 [ 691.748919] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 691.756652] print_req_error: I/O error, dev loop0, sector 16 [ 691.762652] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 691.770350] print_req_error: I/O error, dev loop0, sector 20 [ 691.776160] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 691.783951] print_req_error: I/O error, dev loop0, sector 24 [ 691.789759] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 691.797457] print_req_error: I/O error, dev loop0, sector 28 [ 691.803296] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 691.811007] print_req_error: I/O error, dev loop0, sector 32 [ 691.816817] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 691.824514] print_req_error: I/O error, dev loop0, sector 36 [ 691.830348] Buffer I/O error on dev loop0, logical block 9, lost async page write 03:34:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x3}}, 0x0) 03:34:06 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x200) r1 = socket$inet(0x2, 0x3, 0x20) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0xfffffffffffffd23) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000100)={@local, @empty}, &(0x7f0000000140)=0xc) 03:34:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x8, &(0x7f00000001c0)='pagemap\x00'}, 0x30) r4 = syz_open_procfs(r3, &(0x7f0000000180)='net/rtv') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x4e21, @local}, {0x6, @random="f183187d7015"}, 0x10, {0x2, 0x4e23, @broadcast}, 'sit0\x00'}) ioctl$VT_DISALLOCATE(r2, 0x5608) sendfile(r0, r4, 0x0, 0x100000008001) [ 692.147086] kauditd_printk_skb: 153 callbacks suppressed [ 692.147095] audit: type=1400 audit(2000000046.400:23565): avc: denied { map } for pid=18744 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 692.271585] audit: type=1400 audit(2000000046.460:23566): avc: denied { map } for pid=18744 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 692.491413] audit: type=1400 audit(2000000046.470:23567): avc: denied { map } for pid=18744 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:07 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200, 0x0) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000080)=0xffff, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f00000001c0)=@x25={0x9, @null=' \x00'}, 0x80, 0x0}}], 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x800, 0x0) 03:34:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000640)='em1vmnet0+\x00', 0xb, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="837865002073dceff8"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000004c0)=0xff) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) getsockopt$packet_int(r1, 0x107, 0x13, &(0x7f00000000c0), &(0x7f0000000300)=0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 692.861677] audit: type=1400 audit(2000000046.500:23568): avc: denied { map } for pid=18744 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe(0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'yam0\x00', {0x2, 0x4e21, @remote}}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="4f0000004b28d3b6837203df5f1099984b605aac7fc11f6b9ba46b44657fbb1f3063ff533b7042137e6d5f310652db4558c651660638416190ba61eafbea91aa9e10b29e3dbbae85437a0912f597a2c48c6694d401fb0024c7f5153ef066528a36396bf94e27ed364c5e04a1a75520a3620e02a4b792927c51a92595531e3c4f4ae38d7d374330da94ac2d7af13d16822274092abff01e7829a09d5bec31119f739642e15be2605f120cb7b1d05aed799a5d5a3059a37630ea6d", @ANYRES16=r2, @ANYBLOB="000029bd60f4007de0f5e0989400000000000241000000ab45000000003a7465716c300000001683e981de8798474bd9befd9c54b27d73aa1ec68b35b8799c4b9ea3d62ea3ace489370c4951959384b7e4fdf47fbfd6f3d998aeb3af5fd0"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) getpgid(0xffffffffffffffff) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffffc) sendmmsg(r3, &(0x7f0000007e00), 0x26e, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f000000ac80), 0x400000000000302, 0x4008800) socket$inet6_tcp(0xa, 0x1, 0x0) 03:34:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x3}}, 0x0) [ 693.066628] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") keyctl$join(0x1, &(0x7f0000000040)={'syz'}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000080)) [ 693.180976] audit: type=1400 audit(2000000046.500:23569): avc: denied { map } for pid=18744 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 693.360113] audit: type=1400 audit(2000000046.670:23570): avc: denied { read } for pid=18730 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 693.482238] audit: type=1400 audit(2000000046.690:23571): avc: denied { map } for pid=18752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.605850] audit: type=1400 audit(2000000046.720:23572): avc: denied { map } for pid=18752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 693.748443] audit: type=1400 audit(2000000046.810:23573): avc: denied { map } for pid=18752 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:08 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@multicast2}}, 0xe8) r1 = accept(r0, 0x0, &(0x7f0000000100)) recvfrom$inet(r1, &(0x7f0000000300)=""/215, 0xd7, 0x2000, &(0x7f00000001c0)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0x87, &(0x7f0000000040)={@local, @broadcast, [{[], {0x8100, 0x1, 0x9, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 03:34:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r4 = memfd_create(&(0x7f0000000980)='t\bnu\x00\x91\x93.\xb4\xddy\x00\x00\x04\x00\x00\x00\x00\x00v\x00\xed\x17zv\x18q\xde\xa0q\xf8\xe6\x8bR\xf3\xbe<\x8d\x01\xd45\xb9\xd7\xd0QC\x82Ae\x80`\x89\xe3L\x1c\x0f\xfa>\x7f\x82\xa2g\'\xee!Q\xe0\xdf\xe0\xee\xf9J\x8b\xe9\xd5\xe2\xdc\xac>o\xd8H5h\xb7hS\xc5\x86kM\xdcJ1\xeb\xeb\x1a\x8a5\xb8\x1a\x140x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x3}}, 0x0) 03:34:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, 0x0, 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 694.170226] audit: type=1400 audit(2000000046.850:23574): avc: denied { map } for pid=18752 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x3) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x2000011, r0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) [ 695.052708] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x3}}, 0x0) [ 696.093204] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0xffffff9c}}, &(0x7f00000002c0)='GPL\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)="3d433885902b435423fb02909994", 0x0}, 0x28) r1 = socket(0xb, 0x801, 0x23a246c8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @mss={0x2, 0x3}, @mss, @mss={0x2, 0x5}], 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000001940), &(0x7f0000001980)=0x14) 03:34:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000000)=0x3, 0x4) setresuid(0x0, r1, 0x0) setresgid(r2, r2, r2) 03:34:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x10000000000) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:10 executing program 1: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x0) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r0, &(0x7f0000000300)='net/ptype\x00') unshare(0x40003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = memfd_create(&(0x7f0000000380)='\x00', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ftruncate(r2, 0xfffffd) getsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r1, r2, &(0x7f00000037c0)=0xf10001, 0xfffffdef) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000600)={0x8, "3919983e863b600979112ee78ce7789a606ee5408d39681e37568b586ee53e9e239a4cbd47c57783d22d123f79f5c7c19f2be805be2241c4d366d37396ebfe673a1cb19d473dfe2e1ffdd539973ad4bf51be71e4d8a96d39516d4231cf7911a0edf8f3beb9820462e6343424d3cfeddc7dfb0e7c2a8b387c71ac0033cf93f5a3b66c89d46fda67532d63fd7733c4a25d4b7938d01ded691d16872c9952eae82c71e1c3dec048f1bb470712d5c70bcf5751f99d9de697ff8fa218b18b223baef7b98e1d42e66abf23ab06c606da3dc7ee8d50f3af469035c1391d4fb1694df6a674aa8aed9bfdce9546681fa09f0ab8311561e4f75dd91d14033131abfde28ea36adf9f5ab0009dc59b95630e7578bf073ac20e00da62c441d6ffdbb30beae1ec05285c3d1937062eb2d7f17666ee666ae1ed40588b7dc328692813ffc68ad88a888a1ebf3f00e6a23b19df4772b650758b747dd2cf3d340971fc006fe448b8a302343a788a60000e628b65edbbab1acfcf719b662403dc38dfb6d245ad275916070f007df467a20d4df977acda1155030602b297bfcac1a3f8b0bf06599618593bdc409434c365d8e29c9522dd919838b98bb0c041fb4230a1627e85f3b9d029981976c795eb0e19233c11785a82fede2b639c43445ac9ea1ddf9e5e41764322ea367979d4481a4054bab2b06799bccd39b2ff64621aadc6ff545cb706bede5946424214bcf08e676a0b7f68c5b7e0ad53a25915a10dd9e248c01319c31c5e2c962c52f65a32e05b29dc505e38c0eec28367d56bcb23cfafe9938eb609a2199ea1c3025acdd575da676085673c3ee837eb3fbafa1ba70035b757faab6d1c7c898e23b3030d3047ae1b9fe48d565de31912e774c7b2f37f3764eee4d3d2f94a3e6a1c2ee22b9c86ae66f1f64c3b74e8f841f015bf9f362c7674206d0d98d879901fb89ff9d5bdf9e0a0cee957402d566a18acc1193da2fdb74625cd659bef328630ac496943455d2965d6875254e0954d25a795a153cd6880c52370e10b5025b54bb5380c1dabadf74e1b56d223e4d38e9b220697663e6630c88054049b4fc52eaffd91bfad54d5f4cd112923c2d5162f52e4df29abbc80307f1b97a1a374ae993b70e5407f613084e80fc7ed568a0beb7c89dc988690f31a78788eb9ab2f66636c0e5571699ab9161708332ec1c1d32f0085ba5f34ebe9790b980b824acbe253168b9a6afab86d9bca1a666f242d24b74c9c248d65d2721dadf653ef77384ae9416f258dffb921310f55644ac139642c2bab74b960efc5f0d779f1bcd613ff708260b054bf85d9678f5467e0c4e84d04049c8b6f3609c66adca13dcea0f9d1599f52254c7a3db05f42ab128910b6bf01f7cb126e6c1f7e3de0381b3579adf79d5d25248909f6dbb57a3dcf4af360532cb7fd4df7d6de4ea6a70e22b0693b3d0f6bdcb63a5acc1648cd5da3329633877fb95fbdd2bbef8477574c971cdd93feaf48c8ab7515bad5a36d9194f224a252dafdd8b4299a494c4e64876d08649aacf522f603b0e1a1d048d42a29f55367fca0166c72b78c1760b86b74c039ed9f1b1a7142997750c35254848b01d13a2a7835f570a03c78d49bb55bde34298c8359bbe39f927fbf462d9bfafe548bb066facd5017daf1b1cf680ac59d0c6eecdbd805ef2d05428ed6c92c505de12dfbbe4beab03d5acbfbbfbb90bf8a00d5fd4172db28b7a0989f7db7e20ac02e942b8412e340131ad83ff975154e277fe5835bf4291d25ae3e0af3cee42ed68456a962a6398d72e4c3c0356c50d6e74a68226cf073e556f622b5cfbfef74916563dec0a656bb2df5f4dd57845d6e9bc33f21c8b9b82b02c900181919ea4ddf9febfd73e12356dd6aff427d3b9bc6dd729f424a579e8f35e4d1d448409b69bb5a90ed38284818288e6aee47d298c8282fc5451896ac9da72c200b610b2eca9598830e04cf6dfe516c4533d0f4d2701c2da445e8c4b3a6dab0209da85984c422cc8bb3976fd645c038190fb360a61389b8ffba16ca67dca688438b6be58013f8ccce30c00ad98baa8d392d784fd5c55bdf2bf8dd1261754aa85584695b85ab25f9250221f9bf784c45056b119b65d85db0a5cd756d545366a11a91602b846bb271411fe7871fd492df0e2dcfe4a65d20935a6aa8d329993dc6a449999dfca43ec70f507071f51070c62c2b7c3a9c90b25f065caf1945a9e17970318eb7c6098124d4f5e1cab1843e7136209656f92269141899f5103e497a6773f51d33b5d89627650095770f9bdc2dbbb023eee7a98c6bc4cc2b479424cf63e83705909ff66b5ac6f8cd984f0c5b7ae70f90d9637b62b176170db41736aac6810009746163040e514798c2c18b5a044a69eaf6bd0c322b3025608d91cd487019bbe0fb34d13d7f0b67b7b7e1d44e5d155aeb2451f5d432ba6d4bdb7b1c2522ddfc7fccd460c62c1956711307d116862029201fb763df4e85a85cdcdd5e0bcc044c99ac95632ce9600cc843be6b2d5753e9fa6bf02278205e1cf7ed774ddad46ee5f7fc34033f4d8e19b5938366f408c263042a5c86a413c450c34c9aacb00965aae35e445dbe468a8a6f935959c4b9b86aa7a305ee8866a82fe90ae8d6337d7b2aee7a85d0a6bfbe7a402e9db12e3d27a9616d099c23fe4ad2f1085c6692fee38b6f1262780fef4984728103c21ac34040bb63ff3bb9aa7c8eb286c452d55b9201287a26431a4dafe9f8310af5a0a908fe3ba43b3ed6a4519c9f3652f7702cd992aa85607867c218694ea8a5b95bb25f618d78c45d0002c424fd635589006e6977661aeee68e5841be3db8d9cc886b55adf0513cf18d6b72021a24b9e2813724c883a4e3da2f6a021d1732219d9625dbb8ac3fc01e1c2ca377d72f1f64f471e2becf7b7fe9ef46511f26d17922da1401e635ccc290e36a466b2b1709ce0e4a8d2cbf89d58280ca15e64982c4e7f2b57477454836a20d641400f7c4e6c0fbde4a19952c0fb85fc9868fb709df7ab642ab4b0e95d8a563012a674d69c7db78d287c1465e124764324fba44e618cc2cbf2a5fc50ba314d8154cf99db82ae43c8af5cef7826c80608da05d59630a02c30b7b2857229c905832e7a4fa377b855d149e2632f07dd1663ca5e613aed22e252bdcfc80912fece32b8e43b0e3cd751d43ea65f22d6f2fb8c6fb91bc4d6fb003e87ef950ca955098046f4f7254ef8493096b5e2252b541ffdeb20ac5dbb014e6cca10fbf40b11605608f63aaa9ff6a0eb0e1bbb4e110fe9e27945a2fb8036ec109cccee22070541ba9b49cfaa1ed9e44b71181b3092c88bdfcc1b77f33e820552e74ad4b76edb4d1067271c226e1d0b3f6020d24daac638b6e71dc43b53014174ec84485854f87d8bde57e7d2e57ba4f2427a248439818f3f21be0fad1cfbce33b368beba3e5b75a29821207df93c9d592690dbe0a68615b629fbb8cf711ef9df5f49c72fc70f4e708bd8968423a3d803f366aa3ddf2434f16ad27d397e9aac385bd00943c8da0d0b10e96ef6f15642d08b64c0fe30a3edb2daf01c5b4a5e8385e84a5c8f16829da3455ae17809f450b95e9a773770eaf9e47ee68817d4a902d9c08a7035d908be6507b524117d22141bf5e4b941fb818d81ec9dd0c50635b1d6e126e34783f1100624c91be844104dd2b8033e9d107ffac5c67f155d46e7509996501d3f0fab9f330ffdbdc39166a5779f7f7522f501d1fd3238aa4e4c378f68fafae4de5f9c9902ee6480c631a2485fa0d98bf056e3ecd2adc0c4ff65032ce500b5c6e0ad47b82395e47f7049fde067167f514c0266581700fcc95ccc6867f4a09ae56f5ad76c66f63968073b70dcde70f8ac981b4cfbe6d98749348bcf07f2b8a44ff7c8256447a7dfb919a72627d4a46045fa683f2d2206b537d083c412457687c58b2f7e25328264cb9f098e1732d2d7b273571c8b77a92af112283635187bd40c9100766e286ece8a0fc02a7a4ccc23a97802ef7c78b378e011446f74c1ebcdfddc30c9c4367617ac0d9c5809e07d3049ba4a8f7d8fcf409df2e3444ec5c24d1fe7e229f031cacda464458017e75f887548831fa98a63ac4b78d4dfd36f888b6370345557daf36ce34a44ed128d74a63905ee397f12489150010d1dc2e52c9f0b930598ae781c6d7ae3c9494eadfd1be669a92917844f1dd7be024f40d7a1eb26c0275f76bf4e2d2f2769c7a7c81572d89035938e5374ca74cb087cf5b962c941018098d8da4eb15a3ea020b15a7cdd28798947548605a78cd6157569db4d532a8445dde1b5533733211d112d38d652687c1145345f2e3b344cbdf36d768ca9f78972959d17404fbf14c6003a287f2611dbc53577c90aec08089a7c62c62cd56762521ffa8d62227fe16797300036accc2e702e8caf268262e66c2fede23ac9cf504cd832c2eaa0b897e7440d9d50498480c2ec0e7f1852d5790d4869e861cfce4e514184b13f97cdc8aae8fbd95431dd6f01b1d73478d431e97ff6c3f3a467fdccf6fe4fa3db6489a4114af07af85b3c1c02f06e74f721cab1cb19e2e4fe1a5ae615486c1771fce16914a7c6e047170e1bc1f95cb8f7e87b7b6ee93092c2fa51283cce967cb7f580a66d40dca682eec9a7f56d6b86ab03b0cf31dd15c20043bdd5b1317afa6a7517d6c3f5dc705aaeaf3ceaadf4f2b21c83ff997505cdd3cbb1c3438dac3a9896426fbd8ad1ee6f293212d67e8c669e89743ae3de02e2ccbf1dea01298d1fa8b3f5bf2ec241072672dfdfa17f41f142aa0303a589dcb6880c27ebaca5510f03f2217c748352b0c9ed3d167cd84fdbeddbc2e0de1c5c89716cea850721047d4da252a5a37795260c0b47d13dcdca383a2fa912282fbad7a7421e1e38d5f85d5c14d1ce4189e73133fe12385c648e0ee469576cf86010b2b808432e35f33239329b860031e2f1427d7352de05ced2dfc3cd75b648f8175f7bba97426129d44025db32b0688176a5490c003f51bbd0ef1e17f68dc43035f9459e71cf4093e577e415e77a18807b12ede6ad66fed8c5ba1832231a1614cd8e6b716ec68c516d332fd143fdc7414d2b40ac6be756d1d110f50d614aecb34434a7b03ab2abbf48cb27f8b8246b95287fcff538a72165af82b7258a0b24989d9e6a50f715bd9334952875db2014c2c2a308f0784920d1047f4a383eef6fd1f9ef6ab166bfbc19ef802bacf088e11834cbaf9348afca7efa0f5945aafd12063db20b737da9e1384b2c5aaa0110a9682fe17463709e3cb5751eefcf0b4dfe2f7c11fb035e6f108f3768bfad014ea1060d60fc4c99060a44625a9c08148358abcb63123bc1a42f8a7012679196109f34c16b81492998f4486e5d1457c4a2a72c852b1d36d8f73da16fac4397cc17d8b4ab2e5471aa74cfbf18dca9aec7b2940b75792d38dcc2bf6af047b6f99b47c1ecf514a5699d30cfd91a552b9b4cb2e6f7d4102591d4a8b5fd4e990675b3ce9bb969d713715820201735f3dee8b7fa01716728b38dcaf9d8ac5009f7cefc5df0f118e83d098dd1c3a285e6b1bc6574a52a80967ebac3bbc6cd0b9d158ca7fc6a31b05908acd44d2e38808e19afd7d456e40b018acd7d49c9478e92c34ef4d9bf631d6424db431f1933299dd66dada69a761eb7edac4f2d339dc47901013b7fc140e035ff3819db47506b2544728ddf5b0d8f7eddd6c190371eb1affcfebdb80afdd1d77e5a1d0f71e9c2aa3210a3ce304a0c68bdaf67526eec95ca71f626162c8e5dc9293f7f256bcba04405ab04b477e9776336979fe077f1e85b783fbf09a59", 0x1000}, 0x1006) io_setup(0x400000, &(0x7f0000000180)) 03:34:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x3}}, 0x0) 03:34:11 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="576901d84f3c7cfba2e13ef40990f77bdf54847397a99bb2f4c9c17c72732ff82c674a0b82affc35e2734a232c4a7dde5d5e4671beb70ebdc2f5af9ff8838cc44b669a772a7ac2229b91de66047c88a83d", 0x51, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r1, r2) epoll_create1(0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, 0x0) unshare(0x0) syz_open_procfs$namespace(0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x1, 0x3, 0x1}, 0x0, 0x10000}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) write(r3, &(0x7f0000000380)="0ce60804d99ed693278c74fa2f3f6e55eac5ffcea91b58ca1d05a3fbaf1f1b13ed7cb76c106c81aea6d6ebaafa8f54c2a3038aee6df720305fe32af1281e9d9e95b9b6f4c4adc1d24cf8e02299530aa88667248e603a36ebea64d27d70efb6c28a809533c8a53232ac90d00ea3cffba5f203a6089d31d526c48ed73d89869d7c73", 0x81) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x202) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x102012, r0, 0x0) [ 696.980732] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x0, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 697.164416] kauditd_printk_skb: 184 callbacks suppressed [ 697.164424] audit: type=1400 audit(2000000051.420:23759): avc: denied { write } for pid=18864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:34:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x3}}, 0x0) [ 697.505449] audit: type=1400 audit(2000000051.470:23760): avc: denied { map } for pid=18881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f0000000300)=0x8781622d81fe0569) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="14090fa1da72afa1f5cd2383899e3c217ad278033d247fd163f700c00de63818f9b8174e89229093711879b2f7453398c29ba84f6ea932ea901d76b05b9190d692fe8cc0f6c8b05c29a5e30cf3b5d9b345b1cffb03049c036df746a83a90e29446e81d9e691b3421fa3a86f2185027ef67daa925e9f82c903b7ef98561bb1d3fb5ae776fe2195fad37a2b1615e94afc28a66075d35f8c1f3645f05fa1548fb8b1fb6ffe2fc53f6b22f70b70f28d3ec98e9e909717ef1d50bead4bb19ed953b0780"], 0x1}}, 0x0) 03:34:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_proto_private(r0, 0x89e4, &(0x7f0000000080)="cdb2ab3dab4267fbb67cd0dfff1363c4a925554804849bdbf7898a80c78a6c10bcc950a577baadc5a4413f2ac8b93b7340b8043d28641d9395cda549d17a56273223af2e8f7846dfcb32ef2cc6e6b5c20591a3a3f3de7d8bc10c1d773e18f39bc3398357694b1ef65c7846623d307577d302e6869943eae76837fd179c5d0c6a812f7104010b43a7b1edf91f19783dbfe837a248437e19f6592812ea967e3bd47c178368aa90d23006ac0207bf9167c9a669231556d98bc2b271393dc254449da28309b60e110ba0e77de8328f80d3b4aa2a4f2f7ab0def109cf375fc71847fee209") r1 = socket$inet6(0xa, 0x3, 0x81) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:34:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0xd13, &(0x7f0000000040)=0x0) io_destroy(r1) iopl(0x7) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') preadv(r2, &(0x7f0000001640)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1, 0x0) io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x8001, r0, &(0x7f0000000100)="53aced99a0342077b1ebd8ddf3c3044fc2562e788a789468a6d49081898bd95c8453132fc9d69ddcf9e4f5ce595d7d8b74f96e5c27c819db41103f1925094e6d3c0c473f95426c8315f7b792720c961f081743df599b0710d2c2eda5cc", 0x5d, 0x0, 0x0, 0x2, r2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xf, 0x5, r2, &(0x7f0000000180)="5e2f5df727a886337ef4875bd58b3b6e66ca6a638bd7f221f554240aa9a5c396ae480995a127b743c70649a09f52c9f14a4e51105948ad4c2d868a4a35e8a406353ae9b5120e25a50c266dc5486cfbcba4f82b84708cbe26338bac2fc485046575c6", 0x62, 0x3, 0x0, 0x2, r2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000340)="6d5a2a226f2609de78f2f0696f1f9ab2d8554d0cb37cf94a9f1c442e530ea4ef56c23cbfc929c90afd9c4197efd06ef1148133cf7e846cbc3054d7bd37ba321590ebb0baef0da339a6ddbd17d6ea65f7632c975b82700c1ef974e9fcc1e328bc7c7626fc199c833161b1213f69518dec7e97928a5032288f1eb33f7b289107b3f208cc879775bd353759c7ef16d9ecfe84220913a8a549dc00d1bc90a8b1182a6c42ffc7bb2e", 0xa6, 0x1f, 0x0, 0x2, r2}]) tee(r2, r2, 0x1, 0x4) [ 697.682299] audit: type=1400 audit(2000000051.480:23761): avc: denied { write } for pid=18864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 697.900282] audit: type=1400 audit(2000000051.480:23762): avc: denied { map } for pid=18876 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.039377] audit: type=1400 audit(2000000051.500:23763): avc: denied { map } for pid=18881 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.271636] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 698.365510] audit: type=1400 audit(2000000051.510:23764): avc: denied { write } for pid=18864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 698.489275] print_req_error: 57 callbacks suppressed [ 698.489283] print_req_error: I/O error, dev loop0, sector 128 [ 698.500534] print_req_error: I/O error, dev loop0, sector 392 03:34:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:34:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x3}}, 0x0) 03:34:12 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x100000073) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000000)=0x4a) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$addseals(r1, 0x409, 0x2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_RELDISP(r3, 0x5605) fchdir(r0) [ 698.628191] audit: type=1400 audit(2000000051.510:23765): avc: denied { map } for pid=18876 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.685988] audit: audit_backlog=65 > audit_backlog_limit=64 03:34:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x1) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 698.730857] audit: audit_lost=227 audit_rate_limit=0 audit_backlog_limit=64 [ 698.754673] audit: type=1400 audit(2000000051.540:23767): avc: denied { map } for pid=18881 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:13 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) r1 = getpgid(r0) perf_event_open(&(0x7f0000000180)={0x2000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000100)="7f00000000000000007b0000f4afd7030a7ce9a71534a0bbf5f6f39c854f139bd72e2ffff64cf25f6599260edbd24edb82107c9c167fa64601ec1d4c5683a154ef7ff661c5444417a29835908d06bfaf2a0c92c08043481c10403f7025d5d49fd7ecc1cc387c2a9127fceac5ca57f5", 0x48, 0x800, 0x0, 0xfffffffffffffe01) 03:34:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2}}, 0x0) 03:34:13 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x7, &(0x7f0000001500)=ANY=[@ANYBLOB="18000000000000000000000000fd0000181000009e724f6621e6f98138f9ebf9e2678f4d00bd4b4dea0095a94e49ceb05334df0fdc79b68836e3b43b17a00b895f39a7214f5dea6e254a13cc7d5da2ac9339578c74149cf86357070ee66d442db43c468f294f62fd8981476e2850cfccd702d27b1265fffbb17519079a9ab019266b4af915bc3e2981bcb6f393e11e3d6c070e6254e467a844ea9c35f94a2158b04bac252ae48a58360000000000000000000079576b4067f6ea503c0946817fd1557d", @ANYRES32=r1, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000340)) fremovexattr(0xffffffffffffffff, 0x0) close(r2) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000001c0)) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xc, 0x0, 0x0) sendfile(r2, r7, 0x0, 0x800000000024) creat(&(0x7f00000003c0)='./bus\x00', 0x2000004) [ 699.396404] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 699.544088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18946 comm=syz-executor.0 03:34:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) bind$packet(r2, &(0x7f00000000c0)={0x11, 0xff, r1, 0x1, 0x7, 0x6, @random="d1dfc8d330b2"}, 0x14) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000b00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f0000000800)={0x2e4, r7, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x140, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x85}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9a42}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1c}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @empty, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6000000000000000, @mcast1, 0x6}}}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd705}]}]}, 0x2e4}}, 0x4000040) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 699.688489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18946 comm=syz-executor.0 03:34:14 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000200)={0x2, 0x12, {0x53, 0x60e, 0x80, {0x50, 0x8}, {0x1, 0x7}, @const={0x7, {0xdd3c, 0x9, 0x1b126272, 0x5}}}, {0x57, 0xe8, 0xfffffffffffffffb, {0xb1, 0x7}, {0x6, 0x1}, @period={0x0, 0x3, 0x2, 0x9, 0x5, {0x1, 0x3, 0x9, 0xfffffffffffffffd}, 0x7, &(0x7f00000000c0)=[0xfffffffffffffffd, 0x2, 0x8, 0x1000, 0x5, 0x9, 0x3f]}}}) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000080}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="f963512b7b262b6783fc2f3e0403c31593c07d1a46a0d8b461e951f7f945c2e58a6e80b3f15834bfd9bec5626ee8a3919bf212dc70ee81610b8dc23274dab022474e598bb07950df6bf75a78aa865a38ce2202dc15267c8375", @ANYRES16=r2, @ANYBLOB="000027bd7000ffdbdf251100000008000400000000000c000100080001000a00000008000500010000007c000100080002006c00000008000800ff0f000014000300fe8000000000000000000000000000bb14000300e0000002000000000000000000000000080001000000000014000300ac1e000100000000000000000000000014000300ff0100000000000000000000000000010800060073656400080004004e2000000800050001000000"], 0xb4}, 0x1, 0x0, 0x0, 0x40011}, 0x55df2e9edd87fe3b) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x2}) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000002c0)=""/227) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140)=0x3, 0x4) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000280)=0x1f, 0x12) [ 700.143682] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x0, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:14 executing program 3: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) syz_open_dev$binder(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./bus\x00', r0}, 0x10) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x5c33}, 0xe3c7) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0xffffffffffffffc1, 0x7, 0x7}) fdatasync(r1) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x400, 0x1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffff000) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$smack_current(r0, &(0x7f0000000240)='security,{ppp1em1cgroupuser+\x00', 0x1d) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) getpeername$inet6(r1, 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x81) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 03:34:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2}}, 0x0) 03:34:15 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_getparam(r0, &(0x7f00000000c0)) [ 701.507687] print_req_error: I/O error, dev loop0, sector 256 [ 701.522821] print_req_error: I/O error, dev loop0, sector 0 [ 701.528626] buffer_io_error: 54 callbacks suppressed [ 701.528634] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 701.541484] print_req_error: I/O error, dev loop0, sector 4 [ 701.547208] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 701.554899] print_req_error: I/O error, dev loop0, sector 8 [ 701.560660] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 701.568312] print_req_error: I/O error, dev loop0, sector 12 [ 701.574142] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 701.581826] print_req_error: I/O error, dev loop0, sector 16 [ 701.587628] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 701.595313] print_req_error: I/O error, dev loop0, sector 20 [ 701.601151] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 701.608815] print_req_error: I/O error, dev loop0, sector 24 [ 701.614666] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 701.622444] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 701.630257] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 701.637928] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 701.681957] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:16 executing program 3: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x1, 0x4, 0x2, 0x0, &(0x7f0000000000), 0xfffffffffffffffc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket(0x4, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x84}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="c6000402", @ANYRES16=r1, @ANYBLOB="15002abd7000fddbdf2504000000080006007a00000008000500000000801400020008000b000a0000000800090001000000080005002000000008000400e3000000640001000c000700010000000000000014000300ac141424000000000000000000000000080009003d0000000c0006006c626c630000000014000300ac1414aa000000000000000000000000080006007772720008000100020000000800050003000000080004000500000008000600810000000800060006000000"], 0xc4}, 0x1, 0x0, 0x0, 0x40841}, 0x48040) 03:34:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2}}, 0x0) 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) socket$inet_udplite(0x2, 0x2, 0x88) 03:34:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000640)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x80}, 0x4000012) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000000c0)={'veth1_to_team\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000300)) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140001004fc99f001050175a70cd2383899e3c217ad27803bbd40c575673619bc870815182baffd0a04de7643911ce14f56b389750976418ae0e7ed37cd6e3bc5ca6f755c57bc9e75d465a54ee7e95d9ed8bb114bb77925f1a38329119c4da6c6eaeacc3aae36e6c8aa672ea8342aa28815a07b0f35f72e5208090528f4f84e6cf222a9c0a9c6405f7a6b68db37f242ba1ab04cdc775853fc43870182e9dbbc53b4fdfc92cc68ee0bf28b1362bb00b6ca26bb478bb1815bd543964970a924e07b0"], 0x1}}, 0x0) 03:34:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x2, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x7a4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="3800000010000108000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120010000100707070000c0002000800010045cee677067e17a4479c24bdff2a4d847a433880d4d4e400851da8a120c6ac07000000788c252cd7b443c3f2e0ae", @ANYRES32], 0x38}}, 0x0) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x800) [ 702.542348] kauditd_printk_skb: 197 callbacks suppressed [ 702.542357] audit: type=1400 audit(2000000056.790:23957): avc: denied { create } for pid=19005 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 702.717327] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) [ 702.912230] audit: type=1400 audit(2000000056.800:23958): avc: denied { write } for pid=19005 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 703.099686] audit: type=1400 audit(2000000056.980:23959): avc: denied { map } for pid=19012 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB], 0x2}}, 0x0) [ 703.273897] audit: type=1400 audit(2000000056.980:23960): avc: denied { map } for pid=19012 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/173) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x3c, [], 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000140)=""/60}, &(0x7f0000000200)=0x78) close(r0) 03:34:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') read(0xffffffffffffffff, &(0x7f0000000240)=""/87, 0x57) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'raw\x00', 0x2, [{}, {}]}, 0x48) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x9) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xf3d, 0x0, 0x1, 0x0, 0x8, 0x2008, 0x8, 0x9, 0x8000, 0x72b, 0x0, 0x5, 0x1, 0x1, 0x7, 0x9, 0xffff, 0x7, 0x0, 0x2, 0x79, 0x0, 0x84db, 0x848, 0x0, 0x80, 0xffffffffffffffff, 0x5, 0x7, 0x200, 0x1, 0x9, 0x0, 0x4, 0xea4a, 0x0, 0x8001, 0x1, @perf_config_ext={0xc6ba, 0xffff}, 0x400, 0xfffffffffffff90d, 0x9, 0x5, 0x9fda, 0x0, 0x800}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r3, 0x0) clock_nanosleep(0x0, 0x0, 0x0, &(0x7f0000000140)) bind$packet(r1, &(0x7f0000000380)={0x11, 0x4dc56d2672ac7bc3, 0x0, 0x1, 0xfffffffffffffffb, 0x6, @broadcast}, 0x14) [ 703.555516] audit: type=1400 audit(2000000057.000:23961): avc: denied { map } for pid=19015 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000300)={'nr0\x00'}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 703.696145] audit: type=1400 audit(2000000057.030:23962): avc: denied { map } for pid=19015 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.721011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 703.817173] audit: type=1400 audit(2000000057.060:23963): avc: denied { map } for pid=19012 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.058554] audit: type=1400 audit(2000000057.080:23964): avc: denied { map } for pid=19015 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.131797] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 704.246626] print_req_error: 316 callbacks suppressed [ 704.246633] print_req_error: I/O error, dev loop0, sector 0 [ 704.257884] print_req_error: I/O error, dev loop0, sector 4 [ 704.263694] print_req_error: I/O error, dev loop0, sector 8 [ 704.269435] print_req_error: I/O error, dev loop0, sector 12 [ 704.275291] print_req_error: I/O error, dev loop0, sector 16 [ 704.281161] print_req_error: I/O error, dev loop0, sector 20 [ 704.287002] print_req_error: I/O error, dev loop0, sector 24 03:34:18 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/xfrm_stat\x00') fstat(r1, &(0x7f0000000240)) getpgrp(r0) [ 704.292849] print_req_error: I/O error, dev loop0, sector 28 [ 704.298885] print_req_error: I/O error, dev loop0, sector 32 [ 704.304732] print_req_error: I/O error, dev loop0, sector 36 03:34:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:18 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x0) write$P9_RLOCK(r1, &(0x7f0000000040)={0x8, 0x35, 0x1}, 0x8) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 704.374405] audit: type=1400 audit(2000000057.090:23965): avc: denied { map } for pid=19012 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 704.441019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.463840] audit: audit_backlog=65 > audit_backlog_limit=64 03:34:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127c, 0x72f084) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x9}) 03:34:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB], 0x2}}, 0x0) 03:34:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) ioctl$void(r2, 0x5450) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x20, 0x100, 0x71}, {@empty, 0x4e21, 0x3, 0x80000001, 0x1, 0x1}}, 0x44) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) [ 705.263010] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:19 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getegid() mmap(&(0x7f0000a56000/0x1000)=nil, 0x1000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = getpgid(0xffffffffffffffff) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)=r3) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:34:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB], 0x2}}, 0x0) 03:34:20 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x102, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xffe706d8b544373d, 0xd6) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "0fffaaeb53b5281e009fd46c89d9c6a9"}, 0x11, 0x1) r1 = socket(0x10, 0x100000003, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200)=0x1, 0x4) tkill(r2, 0x2a) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2000000000084, 0x0, 0xca}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x200, 0x70bd2c}, 0x14}}, 0x8000) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) clock_gettime(0x0, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000140)=@v1={0x1000000, [{0x4fc, 0x2}]}, 0xc, 0x0) 03:34:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r3, &(0x7f0000000000), 0x5) fcntl$addseals(r3, 0x409, 0x8) ftruncate(r3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_getparam(r4, &(0x7f00000000c0)) r5 = dup3(r2, r3, 0x0) dup2(r5, r0) 03:34:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='configfs\x00b\xc7\xf5Do\xb1O\x04_\x1ft\xc7\xb8\x8f\xd09c\xb3\xa2\xce\xc2\xbaC\x15\a1L#C\xd8d\x04=\x1c\xeb\xea\x80\x02\xb2\xdc0\x85\xf5\x9f\tVhX\xf1\xccK\xf0\x0f\x12\xf9*J\x93\xa6\x93\x80\xc1>\x87\x19N\x1b]\xa5\x9fd!\x01\x8a\x8b\x02\xd2\xeb\x9f\x1a\x9c\x8e\xb5\x94\xdfp', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:34:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd"], 0x2}}, 0x0) 03:34:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000300)=0xc) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 706.729764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19122 comm=syz-executor.1 03:34:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x355, &(0x7f0000000000)={&(0x7f0000000840)=@bridge_getneigh={0x28, 0x1e, 0x89768aed300177f, 0x0, 0x0, {}, [@IFLA_MTU={0x8}]}, 0xffffffffffffff43}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x1, r1, &(0x7f0000000080), 0x60000004, &(0x7f0000000100)) 03:34:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x2c}}, 0x0) 03:34:21 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000), 0x4) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x31b) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'teql0\x00', r1}) [ 707.314246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19118 comm=syz-executor.1 03:34:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', r1}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x10200, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8a4135a2830300000000000000785f61636c5f636365"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$TIOCCONS(r2, 0x541d) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140001004fc99f5a3705ba052e9e9b70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020c09100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00080000000003200000000000020001007834e609000000020000000005000500000000000a00000000000004000000000000000000000000000000170000000000000000"], 0x80}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x6, 0x8, 0x9, 0xf, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_x_nat_t_port={0x1, 0x16, 0x4e23}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e24}, @sadb_sa={0x2, 0x1, 0x4d2, 0xdcf, 0x5, 0xe9, 0x1, 0x1}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d2}, @sadb_address={0x5, 0x17, 0x3f, 0x80, 0x0, @in6={0xa, 0x4e21, 0x10001, @loopback, 0x7}}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d4}]}, 0x78}}, 0x4080) 03:34:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd"], 0x2}}, 0x0) [ 707.794677] kauditd_printk_skb: 186 callbacks suppressed [ 707.794685] audit: type=1400 audit(2000000062.050:24135): avc: denied { map } for pid=19150 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 707.888801] audit: type=1400 audit(2000000062.080:24136): avc: denied { map } for pid=19150 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.000537] audit: type=1400 audit(2000000062.090:24137): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.256841] audit: type=1400 audit(2000000062.100:24138): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.444962] audit: type=1400 audit(2000000062.110:24139): avc: denied { map } for pid=19150 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.583452] audit: type=1400 audit(2000000062.140:24140): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.719042] audit: type=1400 audit(2000000062.170:24141): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.956164] buffer_io_error: 764 callbacks suppressed [ 708.956172] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 708.969154] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 708.976878] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 708.984579] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 708.992406] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 709.000110] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 709.007770] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 709.015483] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 709.023185] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 709.030899] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 709.054899] audit: type=1400 audit(2000000062.200:24142): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.112415] audit: type=1400 audit(2000000062.210:24143): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 709.186318] audit: type=1400 audit(2000000062.240:24144): avc: denied { map } for pid=19150 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x80000000) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) write$selinux_user(r1, &(0x7f0000000040)={'system_u:object_r:default_t:s0', 0x20, 'system_u\x00'}, 0x28) sendmmsg(r0, &(0x7f00000092c0), 0xde, 0x40004) sendto(r0, &(0x7f0000000000)="0a2f93cb498b4d", 0x7, 0x40000, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @local, 'bridge_slave_0\x00'}}, 0x80) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000280)={0x7fffffff}, 0x4) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/51, 0x33}], 0x1}, 0x7}], 0x1, 0x12001, &(0x7f0000000240)={r2, r3+30000000}) 03:34:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)={0x2006}) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000005c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="a378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={r1, @dev={0xac, 0x14, 0x14, 0x26}, @loopback}, 0xc) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000000c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) 03:34:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)=0x0) fcntl$setown(r3, 0x8, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) timer_create(0x3, &(0x7f0000000140)={0x0, 0x1e, 0x6, @thr={&(0x7f0000000240)="2bebe64c04b43b9215d7e57aee2f043942e57c6fc70d133b4304496f39f3cdd42a5fae7f6d9d0f0575a1b12b9f506438f5a34d6a224beafac3548f05eadacc039cb288f0cd9295a18e999a50a08907686309c805360346b6ba2fc9076e21e0d1c51351a4660d5c0b182cd8fe3b2904d4a23641d31e7c8c1d85b229d8b33c6f335537a7c17f4a56604503977431f1b6aebb090a534eae8c8301b79a2cc876eb78b7f265e5fd3ec88cec01100e87f6ad32fb2adfa2819e539ec65222349eb5704b35b92d468b9aa3ee08cf48777979732c3331", &(0x7f0000000080)="df9156fb6ba131ea42a92122714f80556c601c7cb5e5ab34b397985b"}}, &(0x7f0000000180)=0x0) timer_gettime(r6, &(0x7f00000001c0)) 03:34:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x200001, 0x130) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x3, 0x7ff, 0x8000000001, 0x0, r0, 0xfffffffffffffffe}, 0xfffffffffffffd45) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r3, 0x17, &(0x7f0000000240)={0x2e, 0x450, 0x4}) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x1e, 0x37, 0x2, {0x1, 0x6, 0x90ce, r3}}, 0x1e) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/187, 0xbb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r1, &(0x7f00000003c0)="ed", 0x0}, 0x22b) write$P9_RCREATE(r2, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x0, 0x0, 0x5}, 0xfe}}, 0x18) 03:34:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd"], 0x2}}, 0x0) 03:34:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x238}}, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f00000003c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x4, 0x2) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000440)={0xc23e, 0x5, 0x1f, 0x6, 0x7ff}) 03:34:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) [ 710.029334] print_req_error: 480 callbacks suppressed [ 710.029342] print_req_error: I/O error, dev loop0, sector 128 03:34:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:34:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:24 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x80800) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x1933217a693fe256) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000059dffc), &(0x7f0000000000)=0x2e3) signalfd(r0, &(0x7f0000000040)={0x6}, 0x8) 03:34:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x80000000) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) write$selinux_user(r1, &(0x7f0000000040)={'system_u:object_r:default_t:s0', 0x20, 'system_u\x00'}, 0x28) sendmmsg(r0, &(0x7f00000092c0), 0xde, 0x40004) sendto(r0, &(0x7f0000000000)="0a2f93cb498b4d", 0x7, 0x40000, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @local, 'bridge_slave_0\x00'}}, 0x80) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000280)={0x7fffffff}, 0x4) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/51, 0x33}], 0x1}, 0x7}], 0x1, 0x12001, &(0x7f0000000240)={r2, r3+30000000}) 03:34:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:34:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, 0x0, 0x0) 03:34:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="836f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x0, 0x80000000, 0x3, 0xd20}, 0x0, 0x8, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) pipe2(&(0x7f00000000c0), 0x800) prctl$PR_MCE_KILL_GET(0x22) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000008c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:25 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0xd51) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") dup3(r2, r1, 0x0) utime(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:25 executing program 0: socket$inet6(0xa, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xffffffffffffff2c, &(0x7f0000000380)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x43307bd12b5744e9, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14}, @IFLA_MAP={0x24}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000085}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) 03:34:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:34:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c"], 0x2}}, 0x0) 03:34:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) socket$inet_udplite(0x2, 0x2, 0x88) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, r5) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r4, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r4], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="83786563207000800000000000005f6163636573dc7300"], 0x1) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000800)) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000300)={{0x0, 0x3, 0x9, 0x3, 0x80dc}}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x20000080) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e000000c700000000ed232c4400000095000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) [ 712.801382] kauditd_printk_skb: 165 callbacks suppressed [ 712.801390] audit: type=1400 audit(2000000067.060:24310): avc: denied { map } for pid=19277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.091013] audit: type=1400 audit(2000000067.060:24311): avc: denied { map } for pid=19275 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:27 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/checkreqprot\x00', 0x400, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000480)={@broadcast, @multicast1, 0x0, 0x3, [@local, @local, @local]}, 0x1c) r1 = memfd_create(&(0x7f0000000200)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r1, &(0x7f0000000000)='/', 0x1, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x84000) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, 0x0, "dfda263ec381b2f6ade329bf878d36362347ca1c4ad2c8e4a43b3c465e774e7bfde8829554ed00137274d2926d064561d0447c1fb100cf38add590c6da5326253d445e2adc353a30ab94e626c7d87576"}, 0xd8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:smartcard_device_t:s0\x00', 0x28, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 03:34:27 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast2, @local, @mcast2, 0x0, 0x0, 0x0, 0x800000000118}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200000, 0x88) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0xffff, 0x100, 0x0, 0xffffffff}]}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 713.539277] audit: type=1400 audit(2000000067.060:24312): avc: denied { map } for pid=19277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.712333] audit: type=1400 audit(2000000067.060:24313): avc: denied { map } for pid=19275 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.873857] audit: type=1400 audit(2000000067.120:24314): avc: denied { map } for pid=19275 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:28 executing program 1: sched_setaffinity(0x0, 0x3bd, &(0x7f00000002c0)=0x3ffffffffffffff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x2) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000004c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000340)={0xf, 0x1f, 0x2, 0xfffffffffffffffb}, 0xf) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000300)={'tunl0\x00', @ifru_ivalue}) connect(r0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, 0x0, 0x6, 0x0) connect(r2, &(0x7f0000000380)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0xa76, 0x4, "3b17424addf0eb238c93fb4721047dedfc3da51b500c30f7544197071ce6324daf944884916215cc9a39e20c25538c76fc952099ad9f97d2f5bdad800dab92", 0x3d}, 0x80) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r4, 0x4) setns(r3, 0x0) 03:34:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x6) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd4083899e3c217ad27803"], 0x1}}, 0x0) 03:34:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:34:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) 03:34:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)='cgroup\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, 0x0, 0x0) listen(r2, 0x7f) fcntl$setstatus(r2, 0x4, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) ioctl$TIOCGSID(r4, 0x5429, 0x0) shutdown(r5, 0x1) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xffffffffffffffcd) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00@\x00', 0x101}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r7, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r7, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x0, 0x0, 0xffffffffffffff06) [ 714.040128] audit: type=1400 audit(2000000067.200:24315): avc: denied { map } for pid=19277 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 714.160129] audit: type=1400 audit(2000000067.210:24316): avc: denied { map } for pid=19275 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 714.332899] audit: audit_backlog=65 > audit_backlog_limit=64 [ 714.338744] audit: audit_lost=236 audit_rate_limit=0 audit_backlog_limit=64 [ 714.347586] audit: type=1400 audit(2000000067.260:24317): avc: denied { prog_load } for pid=19281 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:34:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 03:34:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='\x00\x00\x00', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000800), 0x58c8) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000640)=0x14) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2780379d7b346cf89dfd3e530c64c309f116154e0f2038bea46ed30fe3e40662aff7fecf1071b4015949227bf27adba"], 0x1}}, 0x0) 03:34:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x1) pipe2(0x0, 0x84000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x13c, 0x36, 0x108, 0x70bd29, 0x25dfdbfe, {0x6}, [@typed={0x8, 0x96, @uid=r2}, @generic="a9051ec42682c35085f41f8e707ad4a6d52b3b345fa596cf4684179a44a2e21813155e3b842f275e2d0b1f9861bd25c30a879e34ca03dab1f6e9f09ecfb44c945a9e22d0bc21f9c97601264cdb1f1afd8e9470a68460601bb87ff2851e7b11d17c", @typed={0x14, 0x7c, @ipv6=@ipv4={[], [], @local}}, @generic="064ea9b9078e1a3ea5b75aca5285bd799b1721196717ada91a4a278c7322744e7a694ecd4cbd9bb21ec8f9989b91f0dcd050c6f93d4e8ca0f4115317d7aeda49c55d7a20d10e4042da826193fda3fbfe979c06c5023e4a76f8f5f917b454d77dfd171b0ae7af90187e66dc45f0050c5a964ebb925edbd9740be888291a57bd30e09f2d107ca6874498803c66af9b63bf24d4065e6466acdb73a64128ae485ee62ab508abb9ed88e6"]}, 0x13c}, 0x1, 0x0, 0x0, 0x8005}, 0x40040) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffa, 0x4002011, r3, 0x1e) read(r4, &(0x7f0000000180)=""/19, 0xfffffe47) dup(r0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) [ 714.662296] print_req_error: I/O error, dev loop0, sector 128 03:34:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) 03:34:29 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x94, r1, 0x4, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb4e8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x23a28e5cd4f45452}, 0x44000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000003c0)=""/148, 0xfffffc1c}], 0x108d, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000140)='net/fib_trie\x00') preadv(r3, &(0x7f0000000480), 0x100000000000010f, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r4, 0x1000000000000, &(0x7f0000000040)) 03:34:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000640)={0x6, &(0x7f00000004c0)=[{0x8, 0xffffffffffffffae, 0x2, 0x7}, {0x6, 0x7, 0x3, 0x750}, {0x8001, 0x1, 0x3, 0x20}, {0x0, 0x100000001, 0x1, 0x1ff}, {0x37f3, 0xffffffff80000001, 0x8, 0x9}, {0x9, 0x5, 0x0, 0xfffffffffffffffc}]}, 0x10) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='ip6tnl0\x00', 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140801004fc99f83899e3c217ad27803a4a17e4cfc8a33f0d58a070f4332c30dcbaa887e481215785d186e"], 0x1}}, 0x0) 03:34:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:34:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad2"], 0x2}}, 0x0) 03:34:30 executing program 3: r0 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="240000002e0007041dfffd946fa2830020200a00050000000003000000fcffffff00ff7e", 0x24}], 0xc50c7f1f73cb23df}, 0x0) 03:34:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20ffffd, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x8, 0x4}) 03:34:30 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r0 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d0000000a00001f01000000fc0002c9130001000000000050", 0x25}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x14, 0x800) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000340)=0x8ca9, 0x3ba5) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2000000000000003, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x00\x00\x00r\xed\x02\x00', @ifru_flags=0x2}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f00000002c0)={{0xa, 0x4e23, 0x5, @mcast2, 0xd31}, {0xa, 0x4e23, 0x401, @remote, 0x8000}, 0x1ff, [0x2, 0x401, 0x8, 0x9, 0x800, 0x4, 0x10000, 0x100000001]}, 0x5c) 03:34:31 executing program 3: socketpair$unix(0x1, 0x4000000002, 0x0, &(0x7f0000003b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/83, &(0x7f00000000c0)=0x53) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f0000000100)=0x1e) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3f) wait4(0x0, 0x0, 0x0, 0x0) 03:34:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) 03:34:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:34:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x80) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r6 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syncfs(r3) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\''}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7368785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000000c0)={0x53, 0x0, 0x0, {0x7f, 0x80000000}, {0xbc86, 0xffff}, @rumble={0x9d67d3, 0xfffffffffffffff9}}) getsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000300)={@initdev, @local, @dev}, &(0x7f00000004c0)=0xc) ioctl$LOOP_CLR_FD(r3, 0x4c01) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000700)=ANY=[@ANYRESHEX=r0, @ANYRESHEX, @ANYRESHEX=r6, @ANYPTR64, @ANYRESDEC=r4, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYRES64=r1]], 0x6}}, 0x0) 03:34:31 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) dup2(r0, r1) 03:34:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) ioctl$UI_DEV_DESTROY(r0, 0x5502) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) 03:34:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 03:34:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) 03:34:32 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x10000, 0x0, 0x0) r2 = inotify_add_watch(r0, &(0x7f00005eaff6)='./control\x00', 0x8) inotify_rm_watch(r0, r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x420100, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000d19ff4)={0x80000001}) [ 717.969106] input: syz1 as /devices/virtual/input/input26 03:34:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'netdevsim0\x00', 0x2000}) [ 718.055680] kauditd_printk_skb: 180 callbacks suppressed [ 718.055688] audit: type=1400 audit(2000000072.310:24497): avc: denied { map } for pid=19422 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x62) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x240000, 0x40) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000100)) [ 718.250221] audit: type=1400 audit(2000000072.350:24498): avc: denied { map } for pid=19423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.351347] audit: type=1400 audit(2000000072.350:24499): avc: denied { map } for pid=19422 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.479016] audit: type=1400 audit(2000000072.360:24500): avc: denied { map } for pid=19423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.615910] audit: type=1400 audit(2000000072.370:24501): avc: denied { map } for pid=19422 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYBLOB="140001004fc99f5a70cd2383899e3c217ad278"], 0x2}}, 0x0) [ 718.791515] audit: type=1400 audit(2000000072.380:24502): avc: denied { map } for pid=19422 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.967914] audit: type=1400 audit(2000000072.380:24503): avc: denied { map } for pid=19423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 719.215931] audit: type=1400 audit(2000000072.390:24504): avc: denied { map } for pid=19423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 719.393311] audit: type=1400 audit(2000000072.390:24505): avc: denied { map } for pid=19428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 719.512225] audit: type=1400 audit(2000000072.400:24506): avc: denied { map } for pid=19428 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:34:34 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x3ffd) r2 = timerfd_create(0x0, 0x800) fallocate(r2, 0x0, 0x3, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000200)) io_setup(0x4, &(0x7f0000000240)) io_setup(0xfffffffffffffffc, &(0x7f0000000280)=0x0) io_destroy(r3) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) ioctl$TIOCNXCL(r1, 0x540d) write$P9_RLCREATE(r1, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x8, 0x2, 0x6}, 0x1}}, 0x18) ioctl$UI_DEV_CREATE(r1, 0x5501) io_setup(0x479, &(0x7f0000000080)=0x0) sync() syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0xa00) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x3f, 0xc5, 0x2, 0x4c56d15a}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x1}, 0x28, 0x3) 03:34:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) 03:34:34 executing program 0: socket$inet(0x2, 0x200000002, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0xa01, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xbb) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x200000023e, 0x0) syz_open_dev$evdev(&(0x7f0000000480)='/dev/input/event#\x00', 0x0, 0xa0800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000000)={0x2, 0x1, 0x3ff, 0x3}) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) fcntl$setsig(r5, 0xa, 0x16) 03:34:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000000)='./bus\x00', 0x400000, 0x100) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000000c0)={'sit0\x00', {0x2, 0x4e21, @remote}}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x61) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000fffffffe) 03:34:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) fcntl$F_SET_RW_HINT(r6, 0x40c, &(0x7f00000000c0)=0x5) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000900)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000a40)=0xe8) fstat(r7, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = geteuid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) fsetxattr$system_posix_acl(r4, &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x1}, [{0x2, 0x2, r8}, {0x2, 0x6, r9}, {0x2, 0x1, r10}, {0x2, 0x4, r11}, {0x2, 0x4, r12}, {0x2, 0x1, r13}], {0x4, 0x4}, [{0x8, 0x1, r14}], {0x10, 0x7}, {0x20, 0x5}}, 0x5c, 0x1) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:34:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) 03:34:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f000055b000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) r2 = getpgid(0x0) ptrace$cont(0x1f, r2, 0xffffffffffffff0b, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x24, 0x403fc) connect$unix(r0, &(0x7f00003de000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x2d) 03:34:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_FP_MODE(0x2d, 0x3) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) eventfd2(0x100000000, 0x80800) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="83786163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:20 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) fcntl$setstatus(r0, 0x4, 0x3ffd) r2 = timerfd_create(0x0, 0x800) fallocate(r2, 0x0, 0x3, 0x1f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000200)) io_setup(0x4, &(0x7f0000000240)) io_setup(0xfffffffffffffffc, &(0x7f0000000280)=0x0) io_destroy(r3) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) ioctl$TIOCNXCL(r1, 0x540d) write$P9_RLCREATE(r1, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x8, 0x2, 0x6}, 0x1}}, 0x18) ioctl$UI_DEV_CREATE(r1, 0x5501) io_setup(0x479, &(0x7f0000000080)=0x0) sync() syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0xa00) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x3f, 0xc5, 0x2, 0x4c56d15a}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x1}, 0x28, 0x3) 03:33:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x3e8}, @local, {[@lsrr={0x83, 0xb, 0x5ef, [@remote={0xac, 0x223}, @multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 03:33:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1], 0x2}}, 0x0) 03:33:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f00)=@polexpire={0xcc, 0x1b, 0x21, 0x0, 0x0, {{{@in=@local, @in6=@local}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x200, 0x87) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) [ 722.290909] print_req_error: I/O error, dev loop0, sector 0 [ 722.296666] buffer_io_error: 22 callbacks suppressed [ 722.296674] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 722.309579] print_req_error: I/O error, dev loop0, sector 4 [ 722.315355] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 722.323046] print_req_error: I/O error, dev loop0, sector 8 [ 722.328770] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 722.336462] print_req_error: I/O error, dev loop0, sector 12 [ 722.342293] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 722.350142] print_req_error: I/O error, dev loop0, sector 16 [ 722.355941] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 722.363612] print_req_error: I/O error, dev loop0, sector 20 [ 722.369412] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 722.377097] print_req_error: I/O error, dev loop0, sector 24 [ 722.382923] Buffer I/O error on dev loop0, logical block 6, lost async page write 03:33:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000300)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="837865000000007c92864e61636c5f6169636573dc7300b02cd9eb68e9b60521b6cc833f70dfc0ccd6ae9906cc027f4c97ac821116c4c4b0bf39cc8d63820717837a60a0c682b9b00be003c14bd8b243628893fdfeca8e04a7549cd18561fd50c7bc9745f682f8c4b2279e5c66a87fd4e075336c62afdbf9e745529e000000000000000000969c80b8a67cc5f1660a8236d5080000"], 0x1) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000900)=""/4096, 0x1000) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 722.390591] print_req_error: I/O error, dev loop0, sector 28 [ 722.396391] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 722.404099] print_req_error: I/O error, dev loop0, sector 32 [ 722.409898] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 722.417576] print_req_error: I/O error, dev loop0, sector 36 [ 722.423539] Buffer I/O error on dev loop0, logical block 9, lost async page write 03:33:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) 03:33:20 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000001a80), 0x0, 0xfffffffffffffff8) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x8000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0xc) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@in={0x2, 0x0, @broadcast}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100400}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x110, r3, 0xf00, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4ad6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8001}, 0x10) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000340)=""/133) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x465a}, 0xfd80, 0x0) 03:33:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 723.086798] kauditd_printk_skb: 135 callbacks suppressed [ 723.086806] audit: type=1400 audit(2000000000.580:24642): avc: denied { map } for pid=19526 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) [ 723.237289] audit: type=1400 audit(2000000000.590:24643): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 723.398124] audit: type=1400 audit(2000000000.590:24644): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:20 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000240)='GPLvboxnet1trusteduser@\x00'}, 0x30) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) inotify_init() socket$inet(0x2, 0x4000000000000001, 0x0) r3 = add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) sendmsg$nl_route(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="40003b0e00000000f0006900000000000000000000", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) keyctl$set_timeout(0xf, r3, 0x9) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYBLOB="000000005c8c49b20385681063070b580000005628248a905d3b2ddc9979754335673b8c44925065871ea99a1fec4b500c6b80ec5e61c45fbc9005e8ba9669c2a1bcba730a83e09563bbddc9a9", @ANYRES16=r5, @ANYBLOB="030026bd7000fddbdf2501000000000000000841000000100018000000056574683a00000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000000) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000300)={0x64, 0x8, 0x5}) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) 03:33:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_GET_NO_NEW_PRIVS(0x27) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140001004fc99f5a70cd2383899e3c217ad27803"], 0x1}}, 0x0) [ 723.571768] audit: type=1400 audit(2000000000.650:24645): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.717081] audit: type=1400 audit(2000000000.660:24646): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:21 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000007000)={{}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000001080)={@mcast1, 0x0}, &(0x7f00000010c0)=0x14) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) accept(0xffffffffffffff9c, &(0x7f0000001280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001300)=0x80) sendmsg$nl_xfrm(r1, &(0x7f0000001500)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001340)=@newpolicy={0x180, 0x13, 0x400, 0x70bd2a, 0x25dfdbfc, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback, 0x4e24, 0x9, 0x4e20, 0x4, 0x2, 0x80, 0x80, 0x87, r2, r3}, {0x3, 0xfffffffeffffffff, 0x4004, 0xffffffffffff0000, 0x9, 0xa4, 0x3, 0x7}, {0x4, 0x9, 0x30f, 0x1f}, 0x1, 0x6e6bb5, 0x1, 0x1, 0x1, 0x3}, [@tmpl={0x84, 0x5, [{{@in=@local, 0x4d3}, 0x2, @in=@empty, 0x3501, 0x3, 0x2, 0x5, 0x3, 0x7, 0x1ff}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x6c}, 0x2, @in=@empty, 0x3507, 0x3, 0x3, 0x2, 0x2000000000000000, 0x4, 0xda}]}, @ipv6_hthresh={0x8, 0x4, {0x5e, 0xc}}, @replay_val={0x10, 0xa, {0x70bd29, 0x70bd2c, 0x100000001}}, @offload={0xc, 0x1c, {r4, 0x2}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd2c, 0x70bd27, 0x70bd29, 0x70bd27, 0x4, [0x9]}}]}, 0x180}, 0x1, 0x0, 0x0, 0x80}, 0x4) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/4096, 0x1000) [ 723.920179] audit: type=1400 audit(2000000000.730:24647): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 724.071064] audit: type=1400 audit(2000000000.730:24648): avc: denied { map } for pid=19526 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:33:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) 03:33:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r6, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r6], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r4, r4, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r4, 0x4c00, r6) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/126) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000500)=""/36, &(0x7f00000005c0)=0x24) write$P9_RLOCK(r2, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c0000001500090400000000000000000a000000af1fc6127d5bb2d9ac40b28c2a3fda6432c5b7b10000000082c52460596a2c509974e3772928e0765dd571b057f616d370cb422d1012356bcc0533077cb2d981ba5eddbba2bbdb95e4b2f2edbcf5101d524553f2faf595c3b153045f939ec56b8e9696f167a8bc0a3479407e6acee560d60781dc665c9bb066833c037ecc91b5e749074f30af58eb7bf6ee957d09a6bfe952fab1ed7e342c7ff859b0ca9c6f66074823f55cdd98f996", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) [ 724.251010] audit: type=1400 audit(2000000000.880:24649): avc: denied { map } for pid=19540 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 724.308084] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.309994] audit: audit_backlog=65 > audit_backlog_limit=64 03:33:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) socket$nl_route(0x10, 0x3, 0x0) uname(0x0) pipe2$9p(0x0, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x182) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) fsetxattr$security_smack_entry(r5, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRES32=r5], 0x1}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x40) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) write$apparmor_exec(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="8378656320706f7369785f61636c5f6163636573dc7300"], 0x1) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000700)={{0xffffffffffffffff, 0x1, 0x80000000, 0x3, 0xd20}, 0x0, 0x1ff, 0x3}) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) ioctl$LOOP_SET_FD(r3, 0x4c00, r5) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/126) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @rand_addr=0x7}, {0x2, 0x4e20, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x3f9e, &(0x7f0000000280)='veth0_to_hsr\x00', 0x7, 0x100000000, 0x7}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 724.795050] kasan: CONFIG_KASAN_INLINE enabled [ 724.799774] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 724.807239] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 724.814076] Modules linked in: [ 724.817276] CPU: 1 PID: 19574 Comm: syz-executor.5 Not tainted 4.14.101+ #14 [ 724.824460] task: ffff8881cd5e0000 task.stack: ffff88819e540000 [ 724.830533] RIP: 0010:kobject_uevent_env+0x62/0xc60 [ 724.835542] RSP: 0018:ffff88819e547ab0 EFLAGS: 00010206 [ 724.840906] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 0000000000006173 [ 724.848168] RDX: ffffffff828006f6 RSI: ffffc90003dbd000 RDI: 00000000000000c0 [ 724.855438] RBP: ffff8881cb25d3d0 R08: 0000000000000001 R09: 0000000000000001 [ 724.862707] R10: ffff8881cd5e0858 R11: 0000000000000001 R12: 00000000000000a0 [ 724.869971] R13: dffffc0000000000 R14: ffff8881cb25d348 R15: 00000000000000a0 [ 724.877236] FS: 00007f04d3f33700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 724.885458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 724.891334] CR2: 0000000000e95978 CR3: 00000001c745a001 CR4: 00000000001606a0 [ 724.898603] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 724.905883] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 724.913276] Call Trace: [ 724.915877] loop_clr_fd+0x49e/0xac0 [ 724.919591] lo_ioctl+0x813/0x1970 [ 724.923135] ? __lock_acquire+0x56a/0x3fa0 [ 724.927369] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 724.932301] ? loop_clr_fd+0xac0/0xac0 [ 724.936205] blkdev_ioctl+0x4d9/0x1810 [ 724.940092] ? blkpg_ioctl+0x910/0x910 [ 724.943980] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 724.948994] ? check_preemption_disabled+0x35/0x1f0 [ 724.954028] block_ioctl+0xd9/0x120 [ 724.957648] ? blkdev_fallocate+0x3b0/0x3b0 [ 724.961978] do_vfs_ioctl+0xabe/0x1040 [ 724.965886] ? selinux_file_ioctl+0x426/0x590 [ 724.970382] ? selinux_file_ioctl+0x116/0x590 [ 724.974877] ? ioctl_preallocate+0x1e0/0x1e0 [ 724.979283] ? selinux_parse_skb.constprop.0+0x16b0/0x16b0 [ 724.984905] ? __fget+0x1ff/0x360 [ 724.988361] ? lock_downgrade+0x5d0/0x5d0 [ 724.992506] ? lock_acquire+0x10f/0x380 [ 724.996479] ? __fget+0x44/0x360 [ 724.999847] ? check_preemption_disabled+0x35/0x1f0 [ 725.004979] ? security_file_ioctl+0x7c/0xb0 [ 725.009386] SyS_ioctl+0x7f/0xb0 [ 725.012398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19581 comm=syz-executor.3 [ 725.012749] ? do_vfs_ioctl+0x1040/0x1040 [ 725.029060] do_syscall_64+0x19b/0x4b0 [ 725.032963] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 03:33:22 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x200000023e, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000480)='/dev/input/event#\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_gettime(r1, &(0x7f0000000080)) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x188) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400, 0x0) r4 = gettid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x4) unshare(0x20600) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r5, &(0x7f0000000340)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f00000002c0)=""/62, 0x3e}], 0x3}, 0x1}], 0x1, 0x0, &(0x7f0000000380)={0x77359400}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000100)=0x47) syslog(0x0, 0x0, 0x0) [ 725.038426] Code: 03 42 80 3c 28 00 0f 85 7c 0a 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 4f 02 00 00 e8 ea 99 b0 fe 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 48 0a 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 725.057794] RIP: kobject_uevent_env+0x62/0xc60 RSP: ffff88819e547ab0 [ 725.098732] ---[ end trace 233eb685a0984fb1 ]--- [ 725.103749] Kernel panic - not syncing: Fatal exception [ 725.109673] Kernel Offset: 0x11e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 725.120677] Rebooting in 86400 seconds..