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", 0x1000, 0xfffffffffffffff9}, {&(0x7f0000001180)="5d6cd8c10ffdbc849b684520dad2b766efaa1f148377dbedc233d18f2df20e1f51fc1516e20b5f69bee199c672e63f492dc1b0b4fcb5152eefc224d6382e31dd292cf4b7b828940474bfc74ad48759bec525fb2b8bff7b3dd34807c320a84bc0ca99490a8e1d5d31dde31f73994ea5", 0x6f, 0x800}, {&(0x7f0000001200)="d81efd06e4fc41aa609ec20477431ee44a88449eea5ee58cd9273c738faafedfcccc6bd8633fd30a46256c9366e5a3909b109e2343f692120ffcdfec7116b1a7604b4be12a526626497b4146f9d8b4cc6dd6015e2f042a6df7dab3f9cc0decaede2b539f3269500f281464eb40dd121aed8e4f99b4b9bbb2db8d8e6a289ace8220719ca2864779d77a90b75370ec5b7d01b5fa", 0x93, 0xdfc}], 0x10000, &(0x7f0000001340)={[], [{@measure='measure'}]}) r0 = shmget(0x2, 0x3000, 0x54000010, &(0x7f0000ffb000/0x3000)=nil) getresuid(&(0x7f0000002b00), &(0x7f0000002b40)=0x0, &(0x7f0000002b80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002bc0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000002cc0)=0xe8) getresuid(&(0x7f0000002d00)=0x0, &(0x7f0000002d40), &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002dc0)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002ec0)=0xe8) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000003000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003080)={r5, 0x28, &(0x7f0000003040)}, 0x10) syz_mount_image$vfat(&(0x7f00000018c0)='vfat\x00', &(0x7f0000001900)='./file0\x00', 0x1, 0x3, &(0x7f0000002a80)=[{&(0x7f0000001940)="169eb347e5a47adb1ed8f8dd3e4f317dddecf111a6d59542119a804962cf4bd98c2d9bc5a70a5ae2e2b2b260977f5cb0eed405d5275078281be6d99bbd4a48da8296e338af6b87da3160d3123c229e1c1bc618ce4e11ad6dcb537f64790e7b386d6d9c5dac32d2c8c7686a4406348619adfb6a9d72075f5eb4095e006e853d72b815bcf21d92d6b066046f7f83b62f7b3ddf93dd417684bb74c56ddd09e3ca8bbd1ebb2adab7b57abc5e61ff93830036e50e2cc54e29444831c4c18a881951e58b86e676", 0xc4, 0x4}, {&(0x7f0000001a40)="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", 0x1000, 0x18e8}, {&(0x7f0000002a40)="c79b50d6ea94dae265b1f1908337de437ef1e72eb3aa90ef2b10fb4f94b8b757a79f2ce71acbed91cf91", 0x2a, 0x2}], 0x2004000, &(0x7f0000002f00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r1, @ANYBLOB=',uni_xlate=1,iocharset=iso8859-5,shortname=mixed,rodir,shortname=winnt,shortname=win95,uni_xlate=0,smackfsroot=,fowner>', @ANYRESDEC=r2, @ANYBLOB=',permit_directio,euid<', @ANYRESDEC=r3, @ANYBLOB=',fowner<', @ANYRESDEC=r4, @ANYBLOB="2c80"]) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x1000) r6 = add_key$user(&(0x7f0000001380)='user\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)="fcba5999149a6e3a18d2d5720c83e94dc732357cba9783ef8dffb61b16dd8e1668f07f7f15e3a5e552b1e9ae981e5f7bcd0edcb269f4ef968c52", 0x3a, 0xfffffffffffffffc) listxattr(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)=""/188, 0xbc) r7 = add_key(&(0x7f0000001440)='ceph\x00', &(0x7f0000001480)={'syz', 0x1}, &(0x7f00000014c0)="c13dc05a5e21c0fb96c77ce47732e085f948a3c43d4adf895768289140f598", 0x1f, 0xfffffffffffffff8) r8 = add_key$user(&(0x7f0000001500)='user\x00', &(0x7f0000001540)={'syz', 0x2}, &(0x7f0000001580)="bb7340a702776ef97aba312df0a664bbdaf15303039cda2b249ce7c4ad0fb2ff949e6a44eb5770588b2c0244f93273763c52cfbc3bdcac402aaff663f99697d1880d30591234ac8e0cfc73840a521a88aa9693dd5100cf9c162ac2bca8afddc0a0a9eb127508b6dad7f03cf7c0de7bb9cbaabd5b9faadf0373c2deb0b2562bc5e4fd8d5d0b89f6a7fab017895ea9ba53a9b571d66b18c671d5a96bf69d6e3db82d5dbb042e21df9bce1bfacb7ac1e9eda60b802587", 0xb5, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000001640)={r6, r7, r8}, &(0x7f0000001680)=""/112, 0x70, &(0x7f0000001780)={&(0x7f0000001700)={'sha512-ssse3\x00'}, &(0x7f0000001740)="9d631df0a4acbb42fafa868dcdbfb8d0f118ac5d7a0dc238df898894e1b7e0852092f307e4f270b3ce000bc46c890aa923a072b7af9d27751cfdab4f", 0x3c}) 03:55:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}, 0x50) 03:55:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x20200, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000180)=r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:55:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x2c01}, 0x0) [ 1703.452409] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x900000000000000, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1703.788454] libceph: resolve ' [ 1703.788454] d.Fp [ 1703.788454] .' (ret=-3): failed [ 1703.796740] libceph: parse_ips bad ip ' [ 1703.796740] d.Fp [ 1703.796740] .,[' 03:55:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703000000000000]}}, 0x50) [ 1704.365554] libceph: resolve ' [ 1704.365554] d.Fp [ 1704.365554] .' (ret=-3): failed 03:55:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xc0fe}, 0x0) [ 1704.426023] libceph: parse_ips bad ip ' [ 1704.426023] d.Fp [ 1704.426023] .,[' 03:55:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}, 0x50) 03:55:39 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/4096, 0x1000) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1704.591533] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0xfffffea5, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f00000003c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001640)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004380)={{{@in6=@ipv4, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000004480)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @empty}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f00000045c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000046c0)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000047c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a880)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa00)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f000000ab00)=0xe8) r13 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x8, 0x309802) getsockopt$XDP_STATISTICS(r13, 0x11b, 0x7, &(0x7f0000000480), &(0x7f00000004c0)=0x18) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000ab40)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000ac40)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f000000ac80)=@hci={0x1f, 0x0}, &(0x7f000000ad00)=0x80) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000b1c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f000000b180)={&(0x7f000000ad40)={0x40c, r2, 0x727, 0xda6, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}]}}, {{0x8, 0x1, r10}, {0x26c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x40c}, 0x1, 0x0, 0x0, 0x40}, 0x4040040) 03:55:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x4000000000000, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703]}}, 0x50) [ 1705.460745] libceph: resolve ' [ 1705.460745] d.Fp] [ 1705.460745] .' (ret=-3): failed [ 1705.498063] libceph: parse_ips bad ip ' [ 1705.498063] d.Fp] [ 1705.498063] .,[' [ 1705.573489] libceph: resolve ' [ 1705.573489] d.Fp] [ 1705.573489] .' (ret=-3): failed [ 1705.628464] libceph: parse_ips bad ip ' [ 1705.628464] d.Fp] [ 1705.628464] .,[' [ 1705.641335] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xfc000000}, 0x0) 03:55:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 03:55:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x6c00000000000000, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1705.816648] kauditd_printk_skb: 183 callbacks suppressed [ 1705.816663] audit: type=1400 audit(2000001340.480:54055): avc: denied { map } for pid=4410 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.038010] audit: type=1400 audit(2000001340.530:54056): avc: denied { map } for pid=4410 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, 0x50) [ 1706.129265] audit: type=1400 audit(2000001340.580:54057): avc: denied { map } for pid=4410 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.308137] audit: type=1400 audit(2000001340.580:54058): avc: denied { map } for pid=4410 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.454289] audit: type=1400 audit(2000001340.710:54059): avc: denied { map } for pid=4417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x50) [ 1706.638963] audit: type=1400 audit(2000001340.710:54060): avc: denied { map } for pid=4417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1706.732711] libceph: resolve ' [ 1706.732711] d.Fp] [ 1706.732711] .' (ret=-3): failed [ 1706.741399] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1706.782987] audit: type=1400 audit(2000001340.760:54061): avc: denied { map } for pid=4417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.833162] libceph: parse_ips bad ip ' [ 1706.833162] d.Fp] [ 1706.833162] .,[' [ 1706.911839] audit: type=1400 audit(2000001340.770:54062): avc: denied { map } for pid=4417 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1706.913031] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x1100000000000000}, 0x0) 03:55:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:55:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0xfffff000, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1707.018569] audit: type=1400 audit(2000001340.890:54063): avc: denied { map } for pid=4417 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1707.159766] audit: type=1400 audit(2000001340.890:54064): avc: denied { map } for pid=4417 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1707.936863] libceph: resolve ' [ 1707.936863] d.Fp] [ 1707.936863] .' (ret=-3): failed [ 1708.027213] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1708.040957] libceph: parse_ips bad ip ' [ 1708.040957] d.Fp] [ 1708.040957] .,[' 03:55:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 03:55:42 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1872, 0x88000) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x22) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x100) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:55:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0xe00, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:42 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clock_gettime(0x3, &(0x7f0000000400)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000040)={0x0, r1+10000000}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="77c3fc1789d733bdf73c61014f1f2f1a1003a9652adeff071f8954ae1623bd8c549f8c247e636c3949c44b78356ef21386eae8400fa16df6e33b2339988bfde735522b3bfa842b68faf6588c9710da7077dfc969886dd4206ca4486d7db3a515d3aff6074bd0e62728111bdb558d7dddc83f38de8507a8685699158ff0ce03d1ead3a7692b0fc95502c4f15d8fee42a525c0fb4e88a961fbbea2513589d6"], 0x1}}, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000380)=0x10) r3 = getpid() syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r5, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000480)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x17}, 0x2}, @in6={0xa, 0x4e23, 0x400, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x3, @loopback, 0x2ed}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @ipv4={[], [], @local}, 0x6b}, @in={0x2, 0x4e21, @local}], 0xa0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x4, 0x4) tkill(r0, 0x1004000000016) mount(&(0x7f00000003c0)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='ceph\x00', 0x6, 0x0) 03:55:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 03:55:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x1000000000000000]}}, 0x50) [ 1709.189440] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) write$P9_RCLUNK(r1, &(0x7f0000000140)={0x7, 0x79, 0x1}, 0x7) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:55:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x6c00, 0x0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xfe80}, 0x0) 03:55:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) [ 1710.327771] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xc00000000000000]}}, 0x50) 03:55:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7a000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1710.850626] kauditd_printk_skb: 145 callbacks suppressed [ 1710.850641] audit: type=1400 audit(2000001345.520:54210): avc: denied { map } for pid=4503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xb}, 0x0) [ 1711.078025] audit: type=1400 audit(2000001345.570:54211): avc: denied { map } for pid=4503 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.235789] audit: type=1400 audit(2000001345.570:54212): avc: denied { map } for pid=4501 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1711.427975] audit: type=1400 audit(2000001345.610:54213): avc: denied { map } for pid=4503 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.578094] audit: type=1400 audit(2000001345.610:54214): avc: denied { map } for pid=4503 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.671690] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1711.690388] audit: type=1400 audit(2000001345.630:54215): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1711.814614] libceph: resolve ' [ 1711.814614] d.Fp] [ 1711.814614] .' (ret=-3): failed [ 1711.848223] libceph: parse_ips bad ip ' [ 1711.848223] d.Fp] [ 1711.848223] .,[' [ 1711.881378] audit: type=1400 audit(2000001345.630:54216): avc: denied { map } for pid=4495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1712.085723] audit: type=1400 audit(2000001345.630:54217): avc: denied { map } for pid=4495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1712.321694] audit: type=1400 audit(2000001345.660:54218): avc: denied { map } for pid=4503 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1712.440641] libceph: resolve ' [ 1712.440641] d.Fp] [ 1712.440641] .' (ret=-3): failed [ 1712.493604] audit: type=1400 audit(2000001345.680:54219): avc: denied { map } for pid=4501 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1712.518774] libceph: parse_ips bad ip ' [ 1712.518774] d.Fp] [ 1712.518774] .,[' 03:55:47 executing program 0: mount(&(0x7f0000000200)=@loop={'/dev/loop', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='jfs\x00', 0x1000400, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x4000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="ed000000475e8f53f711d60f73e999057792467bec6ea86afb9e010000001d4f61ef67a9f2a38393377870bb7554bea69603be2685fc772bc8eb1ff4d46ec16d15900f5ffb3aa042c71992aeeafd96cbc94667114f34c612fb8fbb4c458441fc5dbf9b4d443dd2efecae7427343da7e31c64ae146d15392432611cc97a2fc1f8acec3f6915aff46252636c9c2138203a557c1a75bc4e3759780305389c01789a86dea0038ffee0abc2024dbbecb77fc484b91791ea6e91893716e167e1c1ed124b90de2e21f33a35453ccc4a96bf30e79ca5a662418a35eede6ace26fa7b8aba6bc0b4123b337f76fb7c588ec9694625eae223a6587e763ad3"], &(0x7f0000000180)=0xf5) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r1, 0x0, 0xfff}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)={r2, 0xcb, "67c7a641d8dc3972b9a9036692aac7dd846979752e96ff98960c9a7358bb0274f7011c4fc3be911463c8fec4aea741a7506f7d56d83f00b90b35a5eef1d2b9f7bc00ea04ce39f9271b1d98304a6adea29c7f0c1e028a25a1f18ed75871ee53f2bc93a127e4bf32a29b9dcebf323fc7d2e8e58739a930a05c7f5c9ac95fa8ac9f6687dd7c34591f2f18d9efd78808e1110152a7f436b54fe3191543814f22744fb311728ba3eb14ae399c256bd902fd0e332bb786ec1af8bf480d71b20fde961870cedf7e3f55f287f55b15"}, &(0x7f00000003c0)=0xd3) 03:55:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 03:55:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x500, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xc000000]}}, 0x50) 03:55:47 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7fff, 0x400000) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x783440) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r1) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x4703, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1712.962711] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:55:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4703000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 03:55:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:55:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:55:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x8000000]}}, 0x50) 03:55:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xfffff000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1714.729568] libceph: resolve ' [ 1714.729568] d.Fp] [ 1714.729568] .' (ret=-3): failed 03:55:49 executing program 5: [ 1714.778566] libceph: parse_ips bad ip ' [ 1714.778566] d.Fp] [ 1714.778566] .,[' 03:55:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:55:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x4603000000000000}, 0x0) 03:55:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\ndDFp]\n.,[:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) connect$netlink(r0, &(0x7f00000000c0)=@unspec, 0xc) 03:55:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x10000000]}}, 0x50) [ 1715.499689] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1715.684652] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:50 executing program 5: 03:55:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x3000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1715.875292] kauditd_printk_skb: 135 callbacks suppressed [ 1715.875307] audit: type=1400 audit(2000001350.540:54355): avc: denied { map } for pid=4577 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xe}, 0x0) [ 1716.088104] audit: type=1400 audit(2000001350.580:54356): avc: denied { map } for pid=4581 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.248137] audit: type=1400 audit(2000001350.610:54357): avc: denied { map } for pid=4577 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.301879] libceph: resolve ' [ 1716.301879] dDFp] [ 1716.301879] .' (ret=-3): failed [ 1716.444897] audit: type=1400 audit(2000001350.630:54358): avc: denied { map } for pid=4581 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.560200] libceph: parse_ips bad ip ' [ 1716.560200] dDFp] [ 1716.560200] .,[' 03:55:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:55:51 executing program 5: [ 1716.689571] audit: type=1400 audit(2000001350.630:54359): avc: denied { map } for pid=4577 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:51 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000000c0)={0x1, 0xe2b, 0x6, 0x100}) [ 1716.849720] audit: type=1400 audit(2000001350.630:54360): avc: denied { map } for pid=4581 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1717.018013] audit: type=1400 audit(2000001350.630:54361): avc: denied { map } for pid=4581 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1717.187983] audit: type=1400 audit(2000001350.640:54362): avc: denied { map } for pid=4582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xc00]}}, 0x50) [ 1717.320884] audit: type=1400 audit(2000001350.680:54363): avc: denied { map } for pid=4582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:55:52 executing program 5: [ 1717.522747] audit: type=1400 audit(2000001350.680:54364): avc: denied { map } for pid=4581 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1717.634384] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xe00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) [ 1718.068422] libceph: resolve ' [ 1718.068422] d.Fp] [ 1718.068422] .' (ret=-3): failed [ 1718.139920] libceph: parse_ips bad ip ' [ 1718.139920] d.Fp] [ 1718.139920] .,[' [ 1718.280163] libceph: resolve ' [ 1718.280163] d.Fp] [ 1718.280163] .' (ret=-3): failed [ 1718.333285] libceph: parse_ips bad ip ' [ 1718.333285] d.Fp] [ 1718.333285] .,[' 03:55:53 executing program 5: 03:55:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) alarm(0x7) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0a38f22d"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:55:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xfec0000000000000}, 0x0) 03:55:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x10]}}, 0x50) [ 1718.786098] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xff03000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x50) 03:55:54 executing program 5: [ 1719.339815] ceph: device name is missing path (no : separator in [ 1719.339815] 8ò-) [ 1719.425473] ceph: device name is missing path (no : separator in [ 1719.425473] 8ò-) 03:55:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) 03:55:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x8dffffff00000000}, 0x0) 03:55:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xc]}}, 0x50) [ 1719.891636] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x600, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:55:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x50) 03:55:55 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) uselib(&(0x7f0000000000)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\nD.Fp9A.,[:\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:55:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 1720.958842] kauditd_printk_skb: 161 callbacks suppressed [ 1720.958858] audit: type=1400 audit(2000001355.630:54526): avc: denied { create } for pid=4665 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1720.991450] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1721.089480] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:55:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x9, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1721.161265] audit: type=1400 audit(2000001355.630:54527): avc: denied { write } for pid=4665 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1721.338022] audit: type=1400 audit(2000001355.720:54528): avc: denied { map } for pid=4667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:56 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x8812, r0, 0x0) [ 1721.475854] audit: type=1400 audit(2000001355.720:54529): avc: denied { map } for pid=4667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x8]}}, 0x50) [ 1721.618821] audit: type=1400 audit(2000001355.730:54530): avc: denied { map } for pid=4666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.649269] libceph: resolve ' [ 1721.649269] D.Fp9A.' (ret=-3): failed [ 1721.662419] libceph: parse_ips bad ip ' [ 1721.662419] D.Fp9A.,[' [ 1721.742960] audit: type=1400 audit(2000001355.730:54531): avc: denied { map } for pid=4666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.792120] libceph: resolve ' [ 1721.792120] D.Fp9A.' (ret=-3): failed 03:55:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xff000000}, 0x0) [ 1721.845353] libceph: parse_ips bad ip ' [ 1721.845353] D.Fp9A.,[' [ 1721.901722] audit: type=1400 audit(2000001355.730:54532): avc: denied { create } for pid=4665 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) migrate_pages(r0, 0x100, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x81) [ 1722.024322] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1722.048064] audit: type=1400 audit(2000001355.730:54533): avc: denied { map } for pid=4666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1722.199847] audit: type=1400 audit(2000001355.730:54534): avc: denied { map } for pid=4666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x50) 03:55:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x47030000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1722.397989] audit: type=1400 audit(2000001355.790:54535): avc: denied { map } for pid=4667 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x1000) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000007c0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1722.921828] libceph: resolve ' [ 1722.921828] d.Fp] [ 1722.921828] .' (ret=-3): failed 03:55:57 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1723.018196] libceph: parse_ips bad ip ' [ 1723.018196] d.Fp] [ 1723.018196] .,[' 03:55:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x800000000000000]}}, 0x50) [ 1723.139361] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1723.145079] libceph: resolve ' [ 1723.145079] d.Fp] [ 1723.145079] .' (ret=-3): failed 03:55:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x9effffff, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1723.230391] libceph: parse_ips bad ip ' [ 1723.230391] d.Fp] [ 1723.230391] .,[' 03:55:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x2000) sendmmsg$unix(r0, &(0x7f00000000c0), 0x0, 0x4801) mount(&(0x7f0000000180)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x2000000000000, 0x0) 03:55:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) [ 1723.944849] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x10, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:55:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xffffff7f) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0}, 0x0) dup3(r1, r2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000180)=0x8) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x3}) 03:55:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x100000000000000]}}, 0x50) 03:55:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x5}, 0x0) 03:55:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/48) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80004) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 1725.089976] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:55:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) [ 1725.250996] libceph: resolve ' [ 1725.250996] d.Fp] [ 1725.250996] .' (ret=-3): failed 03:55:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf0ffffff00000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1725.332192] libceph: parse_ips bad ip ' [ 1725.332192] d.Fp] [ 1725.332192] .,[' [ 1725.485163] libceph: resolve ' [ 1725.485163] d.Fp] [ 1725.485163] .' (ret=-3): failed [ 1725.568199] libceph: parse_ips bad ip ' [ 1725.568199] d.Fp] [ 1725.568199] .,[' 03:56:00 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x10, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0xee6}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x40000000}}, {@mode={'mode', 0x3d, 0x4b853d6b}}], [{@subj_role={'subj_role', 0x3d, '\\'}}, {@uid_eq={'uid'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ceph\x00'}}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@obj_type={'obj_type', 0x3d, '[vboxnet1'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) acct(&(0x7f0000000300)='./file0\x00') mount(&(0x7f0000000340)=ANY=[@ANYBLOB="0a642e46705d0a2e2c5b3a00d348e50f15f6899e63570992014551d52f0da4a7705a599f59d68ea820f3e659db0a1c23d26bcf22306cc62608228ee705303473ad1d0900eda0913c9524396873648ceed29199875c1df1ee8e52416fb1c0cf21508e312b9bad08e94a46d276e1b794ce72a09f6e3a10a3fa8d59956e79f2cad3fa60e44147a3c350603918f8044eed83791880388edd109ebe60a76b17d77b884b17e8607eef300640286702de60d447a943fd0ffb0a124188275febfe8e67a9a0901f36a37c58744bee92f878e861c0e3e9c51dc0b47a8792c95f13115e2984cae621dfa8ea9f61d4d4b3d565fab04cde129fa1"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000440)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 03:56:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x600000000000000}, 0x0) 03:56:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x1000000]}}, 0x50) [ 1725.985649] kauditd_printk_skb: 175 callbacks suppressed [ 1725.985665] audit: type=1400 audit(2000001360.650:54711): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) [ 1726.138643] audit: type=1400 audit(2000001360.720:54712): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.278105] audit: type=1400 audit(2000001360.720:54713): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.304438] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1726.394836] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1726.402737] audit: type=1400 audit(2000001360.760:54714): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x8004000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1726.530927] audit: type=1400 audit(2000001360.800:54715): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1726.620044] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 [ 1726.675129] audit: type=1400 audit(2000001360.870:54716): avc: denied { map } for pid=4760 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1726.789193] libceph: resolve ' [ 1726.789193] d.Fp] [ 1726.789193] .' (ret=-3): failed 03:56:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 1726.822860] audit: type=1400 audit(2000001360.910:54717): avc: denied { create } for pid=4763 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1726.828208] libceph: parse_ips bad ip ' [ 1726.828208] d.Fp] [ 1726.828208] .,[' [ 1726.969411] audit: type=1400 audit(2000001360.930:54718): avc: denied { write } for pid=4763 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1727.041200] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 [ 1727.074287] libceph: resolve ' [ 1727.074287] d.Fp] [ 1727.074287] .' (ret=-3): failed 03:56:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc]}}, 0x50) 03:56:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) migrate_pages(r0, 0x100, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x81) [ 1727.144425] audit: type=1400 audit(2000001361.060:54719): avc: denied { create } for pid=4763 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1727.228292] libceph: parse_ips bad ip ' [ 1727.228292] d.Fp] [ 1727.228292] .,[' [ 1727.273662] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1727.349781] audit: type=1400 audit(2000001361.060:54720): avc: denied { write } for pid=4763 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x20) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000180)=""/175, &(0x7f0000000240)=0x469) 03:56:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:56:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xffffff8d}, 0x0) [ 1728.223913] libceph: resolve ' [ 1728.223913] d.Fp] [ 1728.223913] .' (ret=-3): failed [ 1728.379101] libceph: parse_ips bad ip ' [ 1728.379101] d.Fp] [ 1728.379101] .,[' [ 1728.426411] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x8]}}, 0x50) 03:56:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:03 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) migrate_pages(r0, 0x100, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x81) 03:56:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) sendmsg$xdp(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)="25acb53062fcfbc84c14e8ac1860e58cba7951cd6b", 0x15}, {&(0x7f0000000340)="412c90b7ca5c844914a1995abbe8b4c7efbe3a5370c4919945e1bc7d2e0df81674795842", 0x24}, {&(0x7f0000000380)="7a3805047194b5d80f2e1e98c22514db8a846d62511d87787c2c1951dba656ce8349096fec1b3582b7de189ef0a65bfe53c6328d805864775a7be2e63c7002f1a1d777a9c9a5ad4deda056019dbb55d7bb7767ecc66472308676026f982146300f126af17410b5044ff69b275e3ebe94f5790e1891ef980b45c070acc2b72e7a0f6e3a21fb7a30d5959a6fecf4e032a3c7871d1de2837d884138e4570af47d33f7068e5a7fcf4bf822fb89374078356aa85c373c9a45e8cb29ae3ec6992391d7b555b5c6", 0xc4}, {&(0x7f0000000480)="25b61fd3e862b705d1c6a30db1e664d6a919d24c02883d54f609c522ecb65a5a06f5bdc888aea8b8ebd68b8352592add3942", 0x32}, {&(0x7f00000004c0)="e85b5a0fd76cbbc27312fc8098b5e3b468e5d56d1e10a67ef63b68af39f36f653c86757414a37c72b13ea10090fc64a72eeb44152e2bb4214768a4809aa03e968d20ad9b27bac811ee559f0dba578bddf14eb28b1801c37637", 0x59}, {&(0x7f0000000540)="de0cd7f97df62fa1c64e70dfd52725551a4b93c22312a8d8fa6f267b4f9e9580ea70d64412fea09369a84e7313423b761ee561a456f4a32430c37830751fd844e80b0a4fba200603067e97831c", 0x4d}], 0x6, 0x0, 0x0, 0x41}, 0x1) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) 03:56:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 1729.372802] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x9000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) 03:56:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x10]}}, 0x50) 03:56:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x400) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1, 0x1}, &(0x7f0000000200)=0x8) [ 1729.782544] libceph: resolve ' [ 1729.782544] d.Fp] [ 1729.782544] .' (ret=-3): failed [ 1729.894350] libceph: parse_ips bad ip ' [ 1729.894350] d.Fp] [ 1729.894350] .,[' 03:56:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x700}, 0x0) 03:56:04 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) migrate_pages(r0, 0x100, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x81) 03:56:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x700, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1730.812101] libceph: resolve ' [ 1730.812101] d.Fp] [ 1730.812101] .' (ret=-3): failed 03:56:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) [ 1730.912920] libceph: parse_ips bad ip ' [ 1730.912920] d.Fp] [ 1730.912920] .,[' [ 1731.030656] kauditd_printk_skb: 141 callbacks suppressed [ 1731.030669] audit: type=1400 audit(2000001365.700:54862): avc: denied { map } for pid=4856 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.113765] libceph: resolve ' [ 1731.113765] d.Fp] [ 1731.113765] .' (ret=-3): failed [ 1731.156250] libceph: parse_ips bad ip ' [ 1731.156250] d.Fp] [ 1731.156250] .,[' [ 1731.170016] audit: type=1400 audit(2000001365.700:54863): avc: denied { map } for pid=4856 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.229851] libceph: resolve ' [ 1731.229851] d.Fp] [ 1731.229851] .' (ret=-3): failed 03:56:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc00000000000000]}}, 0x50) [ 1731.285900] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1731.301674] audit: type=1400 audit(2000001365.700:54864): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.329555] libceph: parse_ips bad ip ' [ 1731.329555] d.Fp] 03:56:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x103100, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) [ 1731.329555] .,[' 03:56:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x900000000000000}, 0x0) 03:56:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7f01000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1731.426128] audit: type=1400 audit(2000001365.700:54865): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.541767] audit: type=1400 audit(2000001365.770:54866): avc: denied { map } for pid=4856 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.650236] audit: type=1400 audit(2000001365.840:54867): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) [ 1731.836161] audit: type=1400 audit(2000001365.840:54868): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1731.977979] audit: type=1400 audit(2000001365.920:54869): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1732.102944] libceph: resolve ' [ 1732.102944] d.Fp] [ 1732.102944] .' (ret=-3): failed [ 1732.147858] audit: type=1400 audit(2000001365.940:54870): avc: denied { map } for pid=4856 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1732.199635] libceph: parse_ips bad ip ' [ 1732.199635] d.Fp] [ 1732.199635] .,[' [ 1732.304314] audit: type=1400 audit(2000001365.940:54871): avc: denied { create } for pid=4859 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x50) [ 1732.360727] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1732.387787] QAT: Invalid ioctl [ 1732.435207] libceph: resolve ' [ 1732.435207] d.Fp] [ 1732.435207] .' (ret=-3): failed [ 1732.468337] libceph: parse_ips bad ip ' [ 1732.468337] d.Fp] [ 1732.468337] .,[' 03:56:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x900, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) acct(&(0x7f0000000000)='./file0\x00') 03:56:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) [ 1732.712386] libceph: resolve ' [ 1732.712386] d.Fp] [ 1732.712386] .' (ret=-3): failed [ 1732.848014] libceph: parse_ips bad ip ' [ 1732.848014] d.Fp] [ 1732.848014] .,[' 03:56:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x800000000000000]}}, 0x50) 03:56:07 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) [ 1733.636256] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1733.662628] libceph: resolve ' [ 1733.662628] d.Fp] [ 1733.662628] .' (ret=-3): failed 03:56:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47030000]}}, 0x50) 03:56:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xe, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1733.878014] libceph: parse_ips bad ip ' [ 1733.878014] d.Fp] [ 1733.878014] .,[' 03:56:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 03:56:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:08 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)='md5sum/mime_type\x00'}, 0x30) 03:56:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1000000]}}, 0x50) [ 1734.798873] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x68, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) [ 1735.017080] libceph: resolve ' [ 1735.017080] d.Fp] [ 1735.017080] .' (ret=-3): failed [ 1735.113187] libceph: parse_ips bad ip ' [ 1735.113187] d.Fp] [ 1735.113187] .,[' 03:56:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) [ 1735.204025] libceph: resolve ' [ 1735.204025] d.Fp] [ 1735.204025] .' (ret=-3): failed [ 1735.280877] libceph: resolve ' [ 1735.280877] d.Fp] [ 1735.280877] .' (ret=-3): failed [ 1735.340611] libceph: parse_ips bad ip ' [ 1735.340611] d.Fp] [ 1735.340611] .,[' [ 1735.378020] libceph: parse_ips bad ip ' [ 1735.378020] d.Fp] [ 1735.378020] .,[' 03:56:10 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dlm_plock\x00', 0x200880, 0x0) sendto(r0, &(0x7f0000000300)="3ffc4db68234afcdb8d1132cc31e05340aed085e7cfca49a1e91d1ba2534b1c1fd5ca0a182339d6e697ae12c2204df139785214d5e030ec6ea6dfdf45a9c36cfcb77b995f201cc9e1559e545fca76c41d5226cc5e53e0ca70b0ff7c17a6d6b5ee88f433d0e1069360e1563294c70a3225bc6a5220254081b1a272721386e06bdfaf1fdbeb8afcc2dcd48bcffbb898622459fdab21865d62e4a21d5cfb9872575765cd8824b855d1754550c5a182eafafcbfb083bfa0fd03c73a3acc964b5a751b5ca50236328260a6e953eecddbb238cb103ec156c05390f8c9802508da17cac3bb79c50024850645ad29375c8517baca438ec978309453bc52b76461aad231d39ba695f648bb2c3ed616189b39ccbea593c7ce56c65e817b28d3e313c6a9dfc6f729d4252eb62e0209406e65ea2a662009e5c309ee7dbcb5aae8f1057d726267b3b05bcee9d999be7980925ae23ad24246b8574ed7ddfbdedc7e5fe46bf1da47224704bd2bd37899e3bb1be10ea4d40860de45e89a2d28d49b7ed5d9872ecf2c0f1469092d8981a19babb91ca87e11aff36681ba41a542222716cedc233bafc411ee4c2bd22b5904e5024db4e510a42882df4e67cea722c496d90120cc679c0509e07c11db7ea39cf9f620db790c100432ec28f43cf3e3f4d5de28e5204879391ce82e2ffa66f284194ca6c5920935bfd7bca3d5710a8293dbce532c9f84c2abcbe3672317f05b27ee733f5b2d01c05a2337053bfd5d7b72a24ea68e6ab449cb1b789ae36183a7b493c77d2fc02407eefa7a399902e08e17d8b97347453ec8448a3649eec2c034d57ca3cb9e01be7035698a77615c92fa1ed98dfea2e2569ed20712208a89d4b978e01f4a91c4bf328917b83ec487757561b70f5d6f2c1ac4a9d26af669126113c082ae3106177858377e23fa493a19e838817ae152d0056ad91b8cb5a1d70b86a7b07b669952f75901faee3ca00c9cac0a046129f49b9aff2d1cb6b03f6e6208041ac97dc83afe8d587f6c0091625d20461f6c09a7cbe4dbcf240ed7b3f0ffd0c88095c9e18d926cc336b809b47d5d4ba49166383f47f9509b7d5fd16c3b427fd7f4916fe6179a71826c5f9318202bb78552bb098ab5922d2cff257d47ce6e0454d6810c8240a37f6a09eccf5b36f27c7134b8c057378ae7b358cf8a6e2e09262b410015f86efff91bc343ae7a73267c979ce115766043921bec0f70b01c88c1c034f219386f90fc3299d578e6e91b5fe24cd323113b948639b2fbdd5d8ab5877eb215654799824ade8fa564d4d6df26cea973b3be8879e01bf7d9e2d422d3d851b923c5d39da257b19172db9d8fc2da6326106fd28b3d4e8b58ff9b687375369fb5105228a96fa3500b62af4a5c97369382f092f4f70a2a9c7cd8652e1ae40ecbf1d878a215ed84cf25a5c919593311f7df4f71fd1d2d568eb172d3ebdfd66230b6ef1b1d4ffc11d36abbc7a0035e1716b0f5c22c4da39f8b62d8716e86c3c8a17b73968296d59650092829ba3ba262da330f662cdab9dc8c42281cb9b2397685bddb8e52506d3abf7ffca4fb68a09d01f9943ca57d31abb4ff3a76c66ace4e6b0acc3c3278309dc552e13b7e1d97fb640edb7083ecb96c17bb24b8da6a80dfe3a9c9f2e345437370a3ec84e03e08cd5038255cba7651c6c504d98437951bb4a3627501c57cf8af49966f3b3f671ce2a1efb7c6a82a2c746ec3b1fd6562394bba7260a22491cdc6664387c412dde8e6ed9f128f7e437e0975baf1dbb1bb7057b941b3f6ba7d4f31a8b06721af48031c9036e32b48b780b6a05beb579014efead27335d8c4f4763f416cee22e0788bd066a1d0d3b6b84f293e9a2aeb26020b6221d02ebe0d2acb0c0ee76379d3cba719d81d852b52676294ca5ee0dc1aaa1c6ae3700ce0e3bf478d03445bdc9a16fdee17fbf61ac64ba0f8b81f5158d04dd8889193597a443ffeb41814824296f21253a1261446f1c4a55d8ceac028f9dc11fcc1e51b6db1276c2376047a7fffdce702049c7a112a7e2cf6cc402e5aa2e954340e604e1dbbba7f6d9a18b344076e11b3418487eb72090f049b49072f57b828ed17a408f03649266f1e344c98d670b22b988da571ddc917f7795210d55ec8656798f2f45a19008e4c992b2fd6a290e23f013cf5727f245d5b3972933b44731064d5b3fcb6b8fb0f3258232778e762ef4300f2d318640232f1884108569665bf1b9586f4098d265b9f2491397547cd48aee5127323a507455778e75c9184b7da630ba08637413ffc31ca7017fa254dcc144a32e209fe1105c63e861847bc60792e94f707036ac26d846363e6f15c3e54ef39876585c7e7df7a16f085f0c96abac3df24bca6ddc76af566a5048a64ac4efc2fd15b38387af3f865ae11343229437ccfe01acc7197a8ec76b8e529b35386662d929cf38afd56246cc49f79bed5ac8cce1db0ca63a296d4577c84753cefb38cfbf3248cecefb54e1a42ed1703674095c5527098b7113c98ab65e6f1036795b59fbe5fbed06ad7534162af676bce4585a1764ecaef77d3a6e198bdd2926165c2549d7aa4e0e57f6e060a209ceb10aea9c5619507aa21c8993500152b348f4c9caab806625cfb2fd15a166cfb30c824f1e0a9192d90f448ee17d0190bd997d46a99eedbdeeec1e6ac9da5c7b81f0528ae97801bb6fe744057332ca908b04830efc075cacdbba9eb9c1e9e5f1cf3679076cf683562a082f3ee617a6a59cc707482d154500f1e405c255447712f248117226c3cb24ee77ff8073cc18abb5b20076b68b5fae1182290510bc811c5679bec17f9871cd12379a17e48ff17266bd1295da2e264a28f090023bf27a57e515edc85720760e5a449032b5294c2ecf3ea7955323f73ab06e41808d8d9b099ea679b9425ddcc1b694fd8617bf4b6a6c58d81971a3961b0c3fe8c6efff8c8058abb4e8d665d9da0fe17549da242a3071d9d3c37276ae372c0b22931fb55e573f399e6d59faf121f62eb37c8fc79fd1f8c12f7263ee61b9851fe4f7260ab0b6d7eea0cba2e96a594d9fe044edfc52ebf1b0e5839917a987fb93165d8a83b734f6e6f53d666c48f47e41749002d4803a6da3c068589428bea79f5ea6cd5ce0bef1196e38033679b913f0a8216a56c41a66cf0a551555e36b05ffd46268d5509371bc45eac527fc965a375a703c4e2b97df3bc8b159f6f0cd4c902f3b86eceffd0912694f8825f894279fa0e66c8c3a21a2a904b0c56dd3fa950a83178c973d8f506476739355d0bf532bfd09ec1cdf373ed70cdc936b2c15708cf7445360b7e658c720a4fa4daf3c5636ac2e3eb746df4f53e483a808ada7a90a3657ed09f69a67e5e330199a803aa840d4ad4a7d256f8eb895f7683ef6de28a4a3e893babe158edd1a8a8ac7db10b0035a5311b1e7d9dcee4ac5157a94b968a596c0a48f05209cfb9a82d9b267232a171daaae8cd56b7deab0c0e8e6d26dc3313e893269a33346eff3df73e92702cdeb2e3f24ceec9d586f6017d7f0f368a6325b71fcc7d2450bb959f3cd161053524a0547943365dc98f5ca42f122d3d851f9f11b592240fbcd594335a7dd4d1bd67bcf15522c928bc5105b9665cd25e9782c62f52be49e2d69b31b2b739091c272948bf7e4a442f24251da2cfff303e2417c300ec56d3836b1fd998c7404383f4c0aa3dbd344d31ea36a5cfad22098d82ce738e820b90f2cf53d1b3ca41e1608ec3a3ceb803a37c5d90e7b365411d530a9eac0623ae686c4150771d7554500ac72262abba8df252a6e66f78c2d20e3e74f98c949529d32408591d6202aee54a39bddee70e5cebf76f970bf0df888e9942e4dab3c5f0ce415a41b5809bbd908c99b77aece51d13a9cf5766256ced5a2ac21b2e3544ad585c48cf83a0301424a41078676486e4eb2c3f5f13df20a779e0ce668a790cb4c675bc38e3231ae39165119c58af3f0d95cad9e8ec29cc9d09bf4bb34229c7133eb83a533495eccdf8738da214ecc4cefff05fc7308318057fb97c246f7f4cc3538b4af873b9f53fb8a5e1a9bec6d5df105187179aef38365d285d07c452ac8c242dd310dbae51fcab5bf77cdcea5755bdab1d5faede1a97818ab127052c882bdca88294f820f8b25d0285ba6f3ac7f1a1dc59c22e40542825b71386a6a7d1c60c67df18e0af1d9dd5d3a1dfcc70801997c81946a157e29d895feadd134dc79dc69265cdda1d8a879c292d403faf5b9857b72cd3a13c148b1b8306d3f5f41880fe7c87a1001ed1ea9e553af7b05f40531ae62b2d6bd507d95fbb2e69d471ad7736e4fbf907316a5729ac8240313561da1b7e546734f1b1781a7da83584fbc5c940da39d926e3586f1d269e0e973476b5ed143f3054b204fc0472d6b35924a931e340abf5667d64891ab4de1c88d8b273212d0a979ca2dc126d4db580bb7468f9decd271b5ae56d1d081a8019f9298565a4d07ee8ca320b345b42decd9c2f98a14894364f12561713b3a8b409e67376dc5b00cd9037b81038f0711a58cb5b91ab850cec235af580a7bc2a87bdc453dc2ef7e6ae84e88dd1271b58a2156e5e8c111c571beb0a6b99c3fe08139e9bdb516b0a14335d713f5ea7da96b7d956635db4049917a3f116906485e2b5698fa0720ad3a552e719c2e0e019135ec79c55891387234f388f7e83ed2399690d50e2ce997ea68bf7e9e6c9f8f07c916cf40726201b65c009e7d0af5204a42523126a08e9731021900e93d0a299ef41bc33dbd1cf0225d3c2e084c6299024fb3e17e019946e12afbfc48724de69e91b6895859d88f8ed65edcab7867d878eda0e2ffa71fec4b8b61335178266dc53cdd243b03cb41def33b37ea70ff3a7e8e4f3aa50ee8891a86b76d22a6b96cd2fdd13792346ca5795f9415a3cf7d8dee21ac92fa12aa1fd0c248712932bedc019224c1060e0004cdaf77a234a8a8c7302c57effb5a449bc29b6cac915031b5ebf3f18bb23f72e139cb92b7e79e1abaa605127141e550f906e6b45e4554eb61b99795c0161667e72a2be33963750c6b3caf32b382c6f20db9069e090621c0d4d0e768c4b1870853bd4645615746e56121dccd10c5faf8de738496145fc5bcae50b881b272aeb0765fab131aed07e7f07c4e6f21b743efcb52d434f97e86e25e4ce8edfbfc56740895a1bb6f13eee5e8afc295c9df76fa8f74d44aadf8c3f90eb3fb45f09f5b3b2d8fe81dd069d769f8d6a625516ba6629c85d1f886583a314667e9c4e285392c1d94dadc1e446b3864bab3c55fc3b9667f7522d95e4364f55168462c64d88ab097f24278f6c7fa033f850231b6595d684e0cbb3b1bc2e7ee5cf51c0619e9856ecddf278c910e028b6c412b9159c31f0522ed13cf0e39ea2e21cb4b91c82b5b9ea0c7c91b63b74fd0ad093573dbfed806e651137a6c1776e6c1f55e05179b43d7b87f78b645c2a360a0560ad1257ac838aa96f31e595641c48fcd9f713446a13a4270edc3a77e660e1ad9a7517bb9935cebcb8e1caf49fb09782669c73579487b61ff465d2ce2bd581cf4dcbdfb27e6ed5e71551f59dbb27decb1c592d53c4277b0eb7573c7b8ede34450052c6c912ef26d2fa9e8060d740008ecf169630f879784fac20001d3bbd433961bcb42e31f7f0e4790d725909151d6f6703d1eb89b49f455d4ff84d7aa3d6e3e09282b0bf876fb225376c96fee67c97c62266dba259f474147f2268bc2216cea4457ac27d10f89539695af37c76f5d6a1263238d30c57e82822872ddb6771c4378dd8cdbd67a6e63103a4596752bd13f2ef77ae9ffdd", 0x1000, 0x4000, &(0x7f0000001340)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x1, {0xa, 0x4e23, 0x4, @loopback}}}, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) fstat(r1, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) chown(&(0x7f0000000000)='./file0/file0\x00', r2, r3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) mount(&(0x7f0000001440)=ANY=[@ANYRESHEX=r2], &(0x7f00000013c0)='./file0/file0\x00', &(0x7f0000001400)='ceph\x00', 0x0, 0x0) bind$ax25(r1, &(0x7f0000000280)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}, 0x48) [ 1735.880967] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1000000000000000]}}, 0x50) [ 1736.033914] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1736.043641] kauditd_printk_skb: 166 callbacks suppressed [ 1736.043656] audit: type=1400 audit(2000001370.710:55038): avc: denied { map } for pid=4938 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x347, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1736.180936] audit: type=1400 audit(2000001370.720:55039): avc: denied { map } for pid=4944 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.326704] audit: type=1400 audit(2000001370.720:55040): avc: denied { map } for pid=4944 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:11 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 03:56:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) [ 1736.460243] audit: type=1400 audit(2000001370.720:55041): avc: denied { map } for pid=4944 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="0ac6891fbf5d3ead86b6986ae52a1508f696f08af67ab455b0cd463153a2e1d32fd905c219aba0bce7193ba10635f09fa521f10afb656235333a55466b6c46229a4e4e2bc126e8040fa0dfb816154146e98b9ce8ae8c878fc027a576f1a7633113fbde9e7676998e3181f96e3bb76f06788aa08e08966901555890b5faba7fcbaddb482e8968e89219adb8149a6842d64094b2831289269b7245891f78849e5700f49f33661d6b9f94503f319f342305aaf22fe1986c"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1736.631897] libceph: resolve ' [ 1736.631897] d.Fp] [ 1736.631897] .' (ret=-3): failed [ 1736.695908] audit: type=1400 audit(2000001370.720:55042): avc: denied { map } for pid=4944 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.698008] libceph: parse_ips bad ip ' [ 1736.698008] d.Fp] [ 1736.698008] .,[' [ 1736.867978] audit: type=1400 audit(2000001370.740:55043): avc: denied { map } for pid=4939 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1736.989455] audit: type=1400 audit(2000001370.740:55044): avc: denied { map } for pid=4939 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:11 executing program 5: mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1737.188090] audit: type=1400 audit(2000001370.760:55045): avc: denied { map } for pid=4944 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1737.276044] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1737.323822] audit: type=1400 audit(2000001370.810:55046): avc: denied { map } for pid=4938 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x100000000000000]}}, 0x50) [ 1737.423166] ceph: device name is missing path (no : separator in [ 1737.423166] Ɖ¿]>­†¶˜jå*ö–ðŠöz´U°ÍF1S¢áÓ/Ù« ¼ç;¡5ðŸ¥!ñ [ 1737.423166] ûeb53:UFklF"šNN+Á&è ß¸AF鋜讌‡À'¥vñ§c1ûÞžvv™Ž1ùn;·oxŠ Ž–iUXµúºË­ÛH.‰hè’­¸šhBÖ@”²ƒ‰&›rE‰x„žW) 03:56:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1737.464678] audit: type=1400 audit(2000001370.820:55047): avc: denied { map } for pid=4938 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x12c}, 0x0) 03:56:12 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0xc) 03:56:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703000000000000]}}, 0x50) 03:56:12 executing program 5: mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1738.420536] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xd00a, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:13 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='vyH\xc9\xba-5s\xc9\xe4Ew\x85\xb7\x06\xfaqw\xc8\xd55\xbcgW\xfa\x11)\xb6\xc2E+1Z?\x05\xb2\x9bi\xf9r\xfb\xd1#\xfbP\x19x\xb3', 0x0, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x40) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x101000) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000180)={0xd000000000000000, "2046fc9bb2302baa9c8231aa80f79799bd0ff3ae805e13daae350bcc9acdcd98", 0x1000, 0x1000, 0x8, 0x6, 0x5}) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x7, 0x10000) ioctl$KDDELIO(r1, 0x4b35, 0xffffffffffff0000) 03:56:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc000000]}}, 0x50) 03:56:13 executing program 5: mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 03:56:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) [ 1739.442873] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:14 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x100000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x2}, 0x0) 03:56:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x8000000]}}, 0x50) 03:56:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2001000, &(0x7f00000002c0)=ANY=[@ANYBLOB='xino=on,defcontext=root,hash,fsname=\nd.Fp]\n.,[:\x00,fsname=eth0$-,euid=', @ANYRESDEC=r0, @ANYBLOB="2c010061737572652c686173682c00"]) 03:56:15 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703]}}, 0x50) [ 1740.672897] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x8000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 1741.070401] kauditd_printk_skb: 168 callbacks suppressed [ 1741.070416] audit: type=1400 audit(2000001375.740:55216): avc: denied { map } for pid=5034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.297982] audit: type=1400 audit(2000001375.740:55217): avc: denied { map } for pid=5034 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.448114] audit: type=1400 audit(2000001375.740:55218): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1741.638136] audit: type=1400 audit(2000001375.740:55219): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1741.776487] libceph: resolve ' [ 1741.776487] d.Fp] [ 1741.776487] .' (ret=-3): failed [ 1741.824919] audit: type=1400 audit(2000001375.830:55220): avc: denied { map } for pid=5034 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x10000000]}}, 0x50) [ 1741.943118] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1741.963912] libceph: parse_ips bad ip ' [ 1741.963912] d.Fp] [ 1741.963912] .,[' [ 1742.020871] audit: type=1400 audit(2000001375.830:55221): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1742.078867] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1742.099569] libceph: resolve ' [ 1742.099569] d.Fp] [ 1742.099569] .' (ret=-3): failed 03:56:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x50) [ 1742.152836] libceph: parse_ips bad ip ' [ 1742.152836] d.Fp] [ 1742.152836] .,[' [ 1742.221084] audit: type=1400 audit(2000001375.900:55222): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:16 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f00000019c0)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x8, &(0x7f0000001600)=[{&(0x7f0000000180)="2a2d53e6a0fa961118bce4e1950dc3f91e11330a1049caef410317ee0bcc7c519fd8fc42bb6d499fe428433817165be831ab15add88aa79d5bf582cc05a0d28f1be3e6e7a7a963eb452c6e0786519d186b497ee0494cc34b0b3db329ccb230a52ae73230e305f955960fb6001bf039711d5e496ea783bcee1e42387c6be6038ca5c3e0e19b9f314d2c468189eaf5ff6d1b34aa4d4300ac6439ab91604e44c72271e8bd1b", 0xa4, 0x8}, {&(0x7f0000000240)="9c6b60a1dd92e1d45504610f12e43b0de7146e2adf478042f2f3355462d2975ad7504e9c83505ae40603d4c362ec9aae1be969acb432cf57bf512b6b0e87becaf690ea374af27dd97b1708b4167f3d2b59b7a2e5b0c829260bbe51c82626ebaf48c8ee81a1ad0199", 0x68, 0x7fffffff}, {&(0x7f00000002c0)="2892a9752a", 0x5, 0x4}, {&(0x7f0000000300)="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", 0x1000, 0x5}, {&(0x7f0000001300)="731182fd38d35a3009e231972f16486ca440ffc450a0077ac7e038cae5c5f05744dbfae3caacd5e06b1a81899b423bba997eaf868cf6bf8d8854ad11f88fff41ae7447d9dadd6dd8c8fb7a225f7b56e531a1a6aa6d0d2f556def25f9b0bd965e38e023eeab1a9c045935f28500c6eaf78ce262b9a9b8b06e3648b8ff351dac05121cb36aff3d6d4658409faf9757226db2", 0x91, 0x2f}, {&(0x7f00000013c0)="b7b6401f9d43286bf0ff40f98f8fee3a358d10d987105d6bd017e5065147da1d56343cc8a765215ac7025f572e6e9c0df8d501229ab48407c54dfddf25a6c7d92bca4f22a031cdde59a462a7f688d8221e8146a591e1f1da73f322bd6a0d82b4392d068f56538d06fe25a2f07f0fe8ddcb3e9c9781cfb4919d9f742e7822532d15b2785e66e18220bfb8de90c13e41d5b8e6df3b45a24d6a661c080ee87fadbf4cedc88de781c411d21c32d9bc8f84552ed3a4c4571c0275933302f97211575abd6d8f61f66277ccf5df8e173fcc5d0594e368c0f5a5b015e29ace8f06a452fb4be0c925c103b605efa6efad909f9d666fe1d7f03aa444", 0xf7}, {&(0x7f00000014c0)="1d5b28c19db5027265753148c8efd252ed3309860af8", 0x16}, {&(0x7f0000001500)="9a1512328528a84414ec5906ccf57735618808b26194e16db0516a025261061ac640d1aee7b2d2356e674d888df33b353113d4ebda6c2ccd275f7c75808a93148b520f278ad1b3d3da8e0885687d131693618f1f37da1b6d9737319821e1838bc3769f00395f3ee8b54fa273d78cbbef51905c69ec2fe3bf40b9f2a81fcf142b29dc7a506ae469fda1d127424b00806f0e2d01622f6d8eb437fd02518aa7a4d4f78a5d0f81b5bf5c4956cb2e8473cb075c297cf489f2ed84d7cd9aa27691457f969206ad96cf7aa858183981aaf8", 0xce}], 0xa, &(0x7f0000001800)={[{@nodiscard='nodiscard'}], [{@euid_eq={'euid', 0x3d, r0}}, {@permit_directio='permit_directio'}]}) lsetxattr$security_smack_entry(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='security.SMACK64EXEC\x00', &(0x7f0000001740)='\x00', 0x1, 0x3) lremovexattr(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)=@random={'os2.', '[:\x00'}) 03:56:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x800000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1742.432272] audit: type=1400 audit(2000001375.960:55223): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1742.604881] audit: type=1400 audit(2000001375.960:55224): avc: denied { map } for pid=5034 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1742.778038] audit: type=1400 audit(2000001376.000:55225): avc: denied { map } for pid=5036 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1743.088278] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1743.218427] libceph: resolve ' [ 1743.218427] d.Fp] [ 1743.218427] .' (ret=-3): failed 03:56:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc00]}}, 0x50) 03:56:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4c000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1743.315507] libceph: parse_ips bad ip ' [ 1743.315507] d.Fp] [ 1743.315507] .,[' 03:56:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) [ 1743.496121] libceph: resolve ' [ 1743.496121] d.Fp] [ 1743.496121] .' (ret=-3): failed [ 1743.577969] libceph: parse_ips bad ip ' [ 1743.577969] d.Fp] [ 1743.577969] .,[' 03:56:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:18 executing program 0: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x8) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xe000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:19 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x1aba03, 0x0) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xfc, 0x2a, 0xa20, 0x70bd26, 0x25dfdbfc, {0x20}, [@generic="050ee83256110009ebafb795c4a245d5f5957a3946072bb01d3379b50ef16b9406d44f2f33c27f2a0f754cc0856d25c04d38ba38befa7e18fb374a7f9e2af5390f34fe2cc94090655310a8ef8e9814d5299ca52958cbfe27fb4d65a2b64dc673045df679b4f1b869cdb6c4a1708d9d4056dac7367fffabed663e071c8be0fb5fca43cec8d0f2619e745abcade9e233a2c185a666dce7075a96d8be0e31d93f6e22bf069d97082b7fca56b69f683ce890b7ca0b543c23acead33b0d0cf307ac9a19a807a5808ce2e98712398adbe9", @typed={0x14, 0x2f, @ipv6=@loopback}, @typed={0x4, 0x68}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4}, 0x1) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = dup(0xffffffffffffff9c) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000180)={0x8, 0x61be89ab}) mount(&(0x7f00000000c0)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='bh\x00', 0x80000, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:56:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:56:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x347]}}, 0x50) 03:56:19 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1745.330340] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xad0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:20 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xca7d, 0x800) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0a642e46705d0000ac6a4511eca2"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1000000]}}, 0x50) 03:56:20 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1746.115606] kauditd_printk_skb: 173 callbacks suppressed [ 1746.115622] audit: type=1400 audit(2000001380.780:55399): avc: denied { map } for pid=5120 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x50) [ 1746.308035] audit: type=1400 audit(2000001380.790:55400): avc: denied { map } for pid=5122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.507037] audit: type=1400 audit(2000001380.790:55401): avc: denied { map } for pid=5122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x2, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1746.759647] audit: type=1400 audit(2000001380.820:55402): avc: denied { map } for pid=5131 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.835242] ceph: device name is missing path (no : separator in [ 1746.835242] d.Fp]) [ 1746.883582] audit: type=1400 audit(2000001380.820:55403): avc: denied { map } for pid=5131 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.915366] ceph: device name is missing path (no : separator in [ 1746.915366] d.Fp]) [ 1747.021304] audit: type=1400 audit(2000001380.880:55404): avc: denied { map } for pid=5131 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:21 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb820203c14b279960dd4cb105a908ed2fcfaa413dfc4010aab80511fe73d19c628c01f2f05a3e07fc9c9460c1f9fe0a55f37d9a05b5684eaac614b69d2e92a9f49baae304fdaa589196678eb585c44f0df012eed44d8725227bd94f7b355750af1af18a0b5eabe2e3be91db15b154a79ce008adc884cf2caff43f1fa000000000"], 0x82, 0x2) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0a4ab33bdfe5b08ed94b2b00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f00000007c0)=@un=@abs, &(0x7f0000000840)=0x80, 0x80000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="a0a565fb1724f0b0c63f1a09e44c"], 0x10) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file1\x00', 0x5, 0x5, &(0x7f00000001c0)=[{&(0x7f0000000300)="08749f06875ab80124ac1b1c77d7b4c3058ceaf817b079261795fa0859d8853ff13461d5f60aabc9fb066247479dd7ba5688032180844567e9b31625e27ec782aa7d7daa61e73760bc3ecc9075a5a0d70ba684036cd66c988a60c6f77c9279a5eca2bfc4711a6ab354bd220285824637c48eb278191eb19f9829653fabd63dc6a72065eb746a51ba018024ffa28bae60f43748ddedeb48d58bc4322715ee3ab44628cfe242752b61a6852e1f7855082e6fd25f0858b5ea0e34cc801f", 0xbc, 0x5}, {&(0x7f00000003c0)="63dbca3a6230cf101315b440a6fe5a36049308fa0c7b40af24a7c7b7eaf27ca1db7597bf477d4578698178d8761e0cbd33a902fc1a6b9a9dc5ff8c42a97cdfd90c70dc75eff3fb21bb7593e2d8670d51017612d0149ad667405b38a72f138ca229a9bb18af36ffc68056f871fbc463423a050a03027fdbbdb0886a7f5221d91d25da52fc0cba78c502c7333b5068604a7633f335a2a605da3fc889f53fc59d194cb59032d170748894bc6d0ea3801c2c75ed7cc117d7db969cbb23ab0546b1af8aff8ba2cfbda5ad1401209789ee40814338256ffbc3efaff4aae31b1c9ef0776e2b52fcf28d91d5319ae68bad41481abf3d817d28fe3be5ef18775f", 0xfc, 0x6}, {&(0x7f00000004c0)="0495d549821d4eada9be9a742700618622cbf8975dc699da044d961048fb511b2e1d87558f2b5aff176605e306ad392179a3050e208d1ad520745626b985b7792eac0fabba3ec6b988bdd4ed5805d17850971724de333996ebd6328499fe66aad00291e53dc0d585248539e6d6ba1e9b82bebf6399aea1020b297bd4615963e46892ad3e2eafda88dfb8aba1671014b70c6e518c8480f8a5ef43c40767d2d0ebf4594ec12252167d4dfacbb09631fc2eb64a666a7de26c42ac00d7e2f1237f9845", 0xc1, 0x6}, {&(0x7f00000005c0)="de018d49d2300f45f28c83d4ca8f93c8a242066bebe32a70862c3a907f24994aba26c223f4e34598ea8653548852c4148c774f010c8cdaa734d1e5203d6b725eae24ecd46686836f619cbe3b882ef38b7451dfff609b6bb241244b1d970051483bf885deed36e79af0b9e1ba7ca51a94b35e8ed4c6492264832028332d99e223049047b62e113ba28862788fcbd63f90b852", 0x92, 0x6}, {&(0x7f0000000680)="81672838f3e7793ce93069892d0760b64b42410ae4878c701601dac14c52dee2ff0437cd1a2779792a3538080a5b60ffd42d4b032d3c1d325c9785add8ec8aa7ff6a7347f914db7d57511608dde5a0008f2fb6027d8abeac60876ed940ec14deed4a2dead4dade3d71641a1df62d839bc598dbeaaa48b9e500dbab6fad820b51ad0448d692c3ce190ba251e11fd65f132d3114cf48ae8f8980c4dc6fa97478695bfbdbe845c0d2b80c937c76fa089bbe0cac7cbdf88f1d63f5d59c5f6511253e1e426c50894e8b156291614398c1dbae0413fb1141e46c64d9e9fc", 0xdb, 0x9}], 0x40030, &(0x7f0000000780)=ANY=[@ANYBLOB='usrel,measure,fsu\t\x00\x00\x00\x00\x00\x00\x00\x003w9-50va-u7u3-w67q-\x00w457ww6,seclabel,\x00']) 03:56:21 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1747.203744] audit: type=1400 audit(2000001380.900:55405): avc: denied { map } for pid=5131 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1747.328150] audit: type=1400 audit(2000001380.970:55406): avc: denied { map } for pid=5131 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1747.429141] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1747.477633] audit: type=1400 audit(2000001381.020:55407): avc: denied { map } for pid=5131 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x8000000]}}, 0x50) 03:56:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x60, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1747.659173] audit: type=1400 audit(2000001381.030:55408): avc: denied { map } for pid=5131 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) 03:56:22 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:22 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\nd.\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xa, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x10000000]}}, 0x50) [ 1749.178926] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1749.203150] ceph: device name is missing path (no : separator in [ 1749.203150] d.) 03:56:23 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 03:56:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x50) [ 1749.293017] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:24 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x50000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) 03:56:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x50, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1750.127869] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xc000000]}}, 0x50) 03:56:24 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 1750.260533] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1750.368961] libceph: resolve ' [ 1750.368961] d.Fp] [ 1750.368961] .' (ret=-3): failed 03:56:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7a00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1750.425597] libceph: parse_ips bad ip ' [ 1750.425597] d.Fp] [ 1750.425597] .,[' 03:56:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:25 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x100) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x440002, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000180)=@l2, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/203, 0xcb}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000300)=""/28, 0x1c}, {&(0x7f0000000340)=""/1, 0x1}, {&(0x7f0000000380)=""/127, 0x7f}, {&(0x7f0000000400)=""/100, 0x64}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/169, 0xa9}], 0x8, &(0x7f0000000640)=""/110, 0x6e}, 0x20) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1751.129309] kauditd_printk_skb: 158 callbacks suppressed [ 1751.129324] audit: type=1400 audit(2000001385.800:55567): avc: denied { map } for pid=5215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.272555] audit: type=1400 audit(2000001385.800:55568): avc: denied { map } for pid=5215 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.408635] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1751.427983] audit: type=1400 audit(2000001385.840:55569): avc: denied { map } for pid=5215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:26 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 03:56:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x700000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1751.585477] audit: type=1400 audit(2000001385.840:55570): avc: denied { map } for pid=5215 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xc00]}}, 0x50) [ 1751.745934] audit: type=1400 audit(2000001385.960:55571): avc: denied { map } for pid=5218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1751.785207] libceph: resolve ' [ 1751.785207] d.Fp] [ 1751.785207] .' (ret=-3): failed [ 1751.848347] libceph: parse_ips bad ip ' [ 1751.848347] d.Fp] [ 1751.848347] .,[' [ 1752.007981] audit: type=1400 audit(2000001385.990:55572): avc: denied { map } for pid=5218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:26 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0a6437927b390a2e2c5b3a00"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1752.158022] audit: type=1400 audit(2000001386.030:55573): avc: denied { map } for pid=5218 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) [ 1752.271968] audit: type=1400 audit(2000001386.030:55574): avc: denied { map } for pid=5218 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1752.431939] audit: type=1400 audit(2000001386.050:55575): avc: denied { create } for pid=5219 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1752.608024] audit: type=1400 audit(2000001386.070:55576): avc: denied { write } for pid=5219 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xffffff7f, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xc]}}, 0x50) [ 1753.217416] libceph: resolve ' [ 1753.217416] d7’{9 [ 1753.217416] .' (ret=-3): failed [ 1753.332103] libceph: parse_ips bad ip ' [ 1753.332103] d7’{9 [ 1753.332103] .,[' 03:56:28 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x200200, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x4, 0x9, 0x588c5360, 0xd5d2, 0x0, 0x7, 0x1000, 0xb, 0x7, 0x3, 0x2, 0x7ff, 0x2, 0x401, 0x9, 0x6, 0x400, 0x20, 0xffffffff, 0x205000000000, 0x3, 0x3, 0x995, 0x80000000, 0x5, 0x1, 0x3ff, 0x7fff, 0x8, 0x1c, 0xf0, 0x4b58, 0x3, 0x7, 0x3, 0x0, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000000240)}, 0x4004, 0x101, 0x1, 0x8, 0x10001, 0xe52a, 0x4}, 0x0, 0x1, r0, 0x1) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x111080, 0x22) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x6, {{0xa, 0x4e23, 0x3, @loopback, 0xa}}}, 0x88) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0a642e001bcd3675ca82e425"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:56:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1753.873792] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x900000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1754.558930] ceph: device name is missing path (no : separator in [ 1754.558930] d.) [ 1754.591225] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1754.687446] ceph: device name is missing path (no : separator in [ 1754.687446] d.) 03:56:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x8]}}, 0x50) 03:56:29 executing program 0: mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}}) 03:56:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000140)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_map}) [ 1755.050969] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) 03:56:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4000000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:30 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000000000572, 0x600080) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000180)={{0x4, 0x4}, {0x1, 0x8}, 0x5, 0x7, 0x7fff}) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0xc0) fcntl$setsig(r0, 0xa, 0xe) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000200)) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0xffffffffffffffff, 0x0) [ 1756.065198] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x10]}}, 0x50) 03:56:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) tkill(r1, 0x16) [ 1756.154573] kauditd_printk_skb: 163 callbacks suppressed [ 1756.154587] audit: type=1400 audit(2000001390.820:55740): avc: denied { map } for pid=5314 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6800000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x347]}}, 0x50) [ 1756.327659] audit: type=1400 audit(2000001390.830:55741): avc: denied { map } for pid=5314 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1756.474784] audit: type=1400 audit(2000001390.860:55742): avc: denied { map } for pid=5314 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1756.610284] audit: type=1400 audit(2000001390.870:55743): avc: denied { map } for pid=5314 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1756.768089] audit: type=1400 audit(2000001390.880:55744): avc: denied { map } for pid=5301 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1756.918199] audit: type=1400 audit(2000001390.880:55745): avc: denied { map } for pid=5301 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:31 executing program 0: mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='debugfs\x00', 0x8040, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x400) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r3 = getegid() r4 = socket$bt_rfcomm(0x1f, 0x0, 0x3) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x1, 0x18}, 0xc) pipe(&(0x7f0000000540)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) r10 = getpgid(0x0) r11 = geteuid() lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000940)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r16 = socket$inet(0x10, 0x3, 0xc) sendmsg(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000007061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r17 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000a00), 0x80000) r18 = syz_open_dev$dspn(&(0x7f0000000a40)='/dev/dsp#\x00', 0x5, 0x10d401) r19 = gettid() stat(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000b40)=[0x0, 0xffffffffffffffff]) sendmsg$unix(r0, &(0x7f0000000c80)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)="e506a2bd486037d3cfcaf57e", 0xc}, {&(0x7f0000000300)="e9e3101eff362ac68a49b285628629472d72bf6dad59dd6bb1e26d11821b86c16371b44f7e5b0287795c8732f74bdb918eb79cc4bf20f956ae562b1d3da53cf0dab8464f290457a85267ed14bb7311465d2cedea2a0d6d059f4870ef4019cafbfe46b12d500281301297c880a79a44a45408299e2e3af7d778e7fc32b6ce0f19fb3080ce21932bbfdaa9037c66cda825ad27723618ee7fe095e92eb1745b78bc67e7f8", 0xa3}], 0x3, &(0x7f0000000b80)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r4, r5, r6]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x18, 0x1, 0x1, [r17, r18]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0xd8, 0x40000}, 0x48804) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1757.047490] audit: type=1400 audit(2000001390.940:55746): avc: denied { map } for pid=5314 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1757.132611] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1757.186559] audit: type=1400 audit(2000001390.980:55747): avc: denied { map } for pid=5314 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:31 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) [ 1757.273089] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1757.316335] audit: type=1400 audit(2000001390.990:55748): avc: denied { map } for pid=5314 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4800000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1757.469607] audit: type=1400 audit(2000001391.060:55749): avc: denied { map } for pid=5314 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x100000000000000]}}, 0x50) 03:56:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) 03:56:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1758.211316] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1758.269395] libceph: resolve ' [ 1758.269395] d.Fp] [ 1758.269395] .' (ret=-3): failed [ 1758.313504] libceph: parse_ips bad ip ' [ 1758.313504] d.Fp] [ 1758.313504] .,[' [ 1758.336108] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xffffff7f00000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1758.596580] libceph: resolve ' [ 1758.596580] d.Fp] [ 1758.596580] .' (ret=-3): failed [ 1758.670029] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 1758.698203] libceph: parse_ips bad ip ' [ 1758.698203] d.Fp] [ 1758.698203] .,[' [ 1758.715486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 1758.801503] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 1758.871897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:56:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x800000000000000]}}, 0x50) 03:56:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x8, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x52e}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x80) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="0a642e46705d0a2e2c5b3a0038adaf9d08b4f6be146055c7027adf6265b5cf77053b7b71526e6ec059358a2ae4d64a9f04e60f7b70517e78fb6d53e9723d26e52f6fac75a091c761d3c0b9967c7cbea97cb85a2badf7ccdd4f0738fd85e76dd44ded05b5445a6cd9c8f7f9288ad5"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:56:33 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'syz_tun\x00\x00\x00\x00\x00\x01\x00'}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 1759.590257] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x2000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1760.101112] libceph: resolve ' [ 1760.101112] d.Fp] [ 1760.101112] .' (ret=-3): failed 03:56:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1760.147727] libceph: parse_ips bad ip ' [ 1760.147727] d.Fp] [ 1760.147727] .,[' 03:56:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1000000000000000]}}, 0x50) [ 1760.306689] libceph: resolve ' [ 1760.306689] d.Fp] [ 1760.306689] .' (ret=-3): failed [ 1760.398517] libceph: parse_ips bad ip ' [ 1760.398517] d.Fp] [ 1760.398517] .,[' 03:56:35 executing program 0: stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) removexattr(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)=@known='com.apple.FinderInfo\x00') fstat(0xffffffffffffff9c, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x100000001, 0x5, &(0x7f0000001400)=[{&(0x7f00000001c0)="7cda8c62d49dc27039505cda9f9bc3587cc53c1b404e40f10fe8e402ae25beb81fd5d301a5cad573d5b6bb3d7b9fcb479f2ab4d0797a1da635652a625a3a589bfe7ec670d111968367ec797025803a0f49b05eabac59a3ec3c6ce64a2e891e4d2470b68f71ceaaf959fdd27f38b1732049e2d3ba6edeed08d5f2c3b93bc88935a86c0e3d8af8de3aeabd7c53a66791b331c834c7553010906a74c2aa85d765e8dfe476087730d136f4fb2908c80be683c7d13050bbcf5ed207ab978d1b6ed9a374797c12f35c8e030bccd206093aed293b721b74c529d4e0a9c6d127f3140f488d56df682972ff69d2dddfea64759e214d633bc52853b745aa85832f73ad0c01252811f74e59c39666eeb6e2564db3bf88d512a62e1277a41a5dd1bc59ce6c48a80fddf7e93dccc90a81cf3158caef59494b67f5202071d831a47b09aad6dcfa583f3819a7ce343dbaabe73f894c11f638869a1de417468e36ef24271fc388ef0507c4bf00735c1ecb9fd29c19a68f292627cfcf3794a1df8484e1a9cad8b65a30c5532439e6d95a5bbf6501df20f8f8e21d0d9f04eccb9ef48039f91150e499eb2e4d1c34297dfe961fb91c175ea05de2076e4c29e61835ef4e27d7ff95e8361d5c8f383a2a1311dcef485c62c11a6eb6b233518d9ce840e0da3f860b420d8dc94c8f88acec9b0786c700fab5a63ab7d1165531d814e4a968c35cfe14e9863c33a00616b2d2525d7ac1b01c71b271279496d4fc5210aacef2efd423247d42b60f85182ecf195087b08c0c9bd05e5fc3f53fcf687224e8a3318fa599ebbf68d47b9bdb6acc8f1a74dd76ec9dde4a286506fa6efe1a42e4105625cfbf7fcd7b8dd0c4e96fbaa68780df92cac4c2e31b05b44223040d41656c06afa181c1d85eaefff929749a0d0877963fc15d4995205585e496cc9f578c0fbf8622bf3b37bcf677a88edeb09a70328b6df15f794c602d494ad9f975d815ba6b7c69e7a535acc4cd9997e01ad3e07133c1cd608873b53218f016fd162732e903a0a88425ebf7c2dac4efbe496bd7d3fe5c2de5ee9cf53f56fe14e4b8bd7c057c497286d11b8f199c471ecd61aa4ad9a591cb2509fa6d4d0d64f0c2e510a45909114ecc8a4b56e6a111a8c759e114b69bc5f5dd5e11a67d292bfade58a4f9f94e82b4ffafdfa7ed1ad5a7f9da718dba801079090f8ae1b538b66003be83d4c5f961a65f4beb4c4e8d17f1bc58ddd94bfe0d08260d338d0463e36b1781324ba2ddb04f24932e2cc314923a0c42d90b70edd6e1f94bb131a8f966ee49940ce6391b12496c3325907894bdfd3d9bd49447baa7c5ac0b4c2df57d11c572f6f629a621b0941122023b66350e09da6dd2f6e1593d18838d355fd2ec9c68cf75bcb364f6146b98393fcde6f86b1550e4ef828ea968a288a51ee4d9e0e863f4aa150acb5437563f36d235e16ea31a480e36bb1225356589e4717872210b9348b379e03927cc68cbbaf2308aa99d9c2aecf9228148526eb18ea4b90c98d56236644221f490da4c01206c9f70c9b8b3a6caf4ac80c14f7c69a5e99778037006800dbf1bf67ddd0e8ef396c615553fcc13d511e04e86aa7d1712bd13e1e4621444cc02accb3ad3302da34fe99d897c113a30d1b9fc2eea4b2083f2f22103e4faac302a7d3cff9370cdb9b386ac44d4d1bad8af80c4b008af28b75c8b967303bc187f7fe4eb6d8a66447987dafeba668080197e760839eb7457f53e07efa95912161cd23efd90fabfda5bece35ecb151003dd7d3349a4b772b42d599452ca8e38b4a771fe4214cb27ddc061155b816ec6148e1b4795384597cf8b96007f2b489d8f2124f0268f8e1c0bbe9136450bb8ebae1c94eb13fbf52df13e7025497ac09ab2521fe22522f1d6949d856794d18893aca23b161f51bebf3a9d15abf56ede9d6c6346fa28c933d54e85350333c0223d672b5898c0874902188860e3d4794502b1247a6aea60d577086268a3b4f28d2a6e25e1b8479130b08f3e49cc13c8835a6adf2acb087fe2eafaff2ae00df7aaddd41ebee4fe4c799c7f579a69bf62a5d8903dad747a255668fb1403aa19ad65bf15f658cae2f876b07377078b3de1257e02b2652054b9880f078521021c81e36554ef27432bd372f40a8c8d94ddc5ba5fa50fc3b74f5bed24a5dabdd22910c8cbd3893cb8b8e9da77332aed57926d47e1bd0ab8c16945cd56bad2c6fc358d34230a6118054a63a711aa411d6322e27488616ad0f8e128668d67300c561eb590117ea2d4ae8b8ec4797bb2815f477c357c3ec1ac076a57a7fdf60dd3f71a998827aca31e591f5d2fbcbac0fda7243e536bf1e10b92c08df014bd0bb9ea8d711570efab46fcb33cce8605ac1b743b8955c38eb147d54921dd31d1fcdeba96cc7c2a245f8baa8c57fb4c8fe497a3e47dfe2aeb9339b562db5b078f151eafbeff2fb8aea11efcfb24a26e7ab827e58f7bc2a98c17a22404b529a353c261a514b9f360aed36c614f3f04a993fa784305007c8f967f6d6342be433fadbe123ad8b2977538548f8768580b15db026554462ccde04b526d2726424f1ff1ba05ec11f8eec7fb3b81c1fa54ba244bf8d9b6a58fa04a3fdda015954423826d97247c2f38f27765de9d199d999a1bbbc0c55f21aced44b8efa016c257b6a239ddc7dde0b643490b59094240b0ef77888c0d532262371848d09444e8ad7a3a7b4bf643b2dd2a018785cc1e8db6bbe2522d3102654e0cc7c20f8d6c1ea41362238b14b045c41d0166cac7672607e118cee7a8d428746ae88d6b59b473bf2c4ad1c4e7ca6306bb6656432cf93dabde7490eff9f2280401e1dd290c085cd19baad1e35bdcd71ca530cf6dd0eab63566b9e29d8f756d98135e3fd99f74e03229ffa8bdda863ab0dd50ae55636bb0bc5bc3964727d19d7e8a27b3e5c909adbfc00629dfad7f01abece3d6a31c501f9df3c396f94542cd3676f079605cd67a8364c1aa6cfaf63889f5f53a6620cce808382d0efb2b0241ea9797862896ed758abd40f57993ee70e978c0cef5a859ff9dcfe9cd27345a4a27980054c31b72880d06a9494f8943e05785427a60d5dea890bf257b99af192526658b6c587eae47f44322125e834fb8f55f8a6997bd19fbe21e8e15a5ea5c2c7a405bc312d131bfcd04d725a2dec26db09b168cacc47811a37ce60acf6b0c09b672ad4761d5ec872dbf9b7f49da86633d74f18c2425bf452a58a157ed5797662ce034e11643190c936638b5c1572541eac238bdcb832bcbdc7fb9e33f60be0439dbc8e4e70ac5460cc4ead9b4f7e5d0cc3639c9d1e1c52e4f2d3bbf51c43cfbc45579fa79c8210649404685f89e59fbc19625c4e5c2ac157f2cf7bc23af00f6b4198b74a8ca638b2c47e6eb203504b4d85fcfec16b0fe4580a099425bcdd91b3dc9c3133c1ccf9c4fbcc0a3d214455239ef943cd58516c7423252a123052fd281a2c41f1a766b22cc122dbca015de51189eca6a0a711b47e10fffe3d7bea4fba53a177a0aad8070b185586cdc82cb126fc44cb5cc5511e1ae458c6432f50124a5c9e4e620f1ad268cddf73200131ee933b8fa32148062a2420f11c8b14c40d46f05370019904464588c7c2c6b9d9d5b832e46ffa97d6921eeab351f5d957f9aacd250a3167ff7ebf727517dca0ac3c5bf9f310c10e14770258054dad2a720ead2ad1362d5da3e96cafafe1e1a2d9b58a1f424e7cb637e566d0223e3156d0cf20f1fd5fe6359a3df3e7ed5b596a9eab0d404c7e1d8137b20e6efdd2e12f2d2823f0012b5b6205dbe0587ca78f0dacf840820a0672f8d3c6c8f1253b9e914e17bc92a68f598acff992c04ddbf9c193db8c777dd2b40e65e735bf92028e7a257c9e9b025f300f7e7a60521047876c62e8d7466090d2364ad1d3f9a5280a037cdf3ab701810d03ede1fe8578edced76d659a9e74345bcfe9a3de6b15991e11a39454fbe2552b1c2c757e66422704b00043534fa6fcebd328c2782e7a12117c8c9189cdff259d0db3c3725c6d1d7fe1f023036c25ffc688f919a68de3121e9d7137a376ce792e1fc69752fc0009eb5590b5e5ec3393788952068ee6b52eb76b293c838d5d63a2ae46f12bda5b7e43b3aaff6b447dca1828f257f5ef761151655ad238b9de9aeec9d5a87e4d1c89225f8c39eb978cae4977b4eadeb41461c3d2cd693d9811b1930519385add6984b584210a211eeef4db745c17fc624c0006f9d10f1d153eb85f6a3718bba42e5415dec573028b99d3ca3ff3c68479f645f4550e16c5737794529f200fcda003e2494e68907e23facee95e60620523bf9b2e11d4957fb6e065ebb2721664f136dfaa6c06b51e319282fc4cc0aa966e547f92ff0fca9704c757a7b3ea33dacda537ea4e2db39dde894beaee2bdeb7cb22a04cdff44a7fa1aa97fee15b61d786010323408c04633319ffb13449eab854188b1eaf52e7b6395c453c8ccf978f56b98be88140d17f77ed57fb894055dbef2c51479bbd55bc904ebf3207a7b1ca6b0752c20d91a6dc3bca9f990330e7f0839ab9a3a45e2954ccddba0bfd51119a7ea5f614ad9847787fe69e67caea80187d1baadb9643520c1e7ed53a75a2400fd9cd957aa594ee4f69835c39972c3587a9870f833306f96313b6e535c00bd42f01217543a15d5e98cf79fa9d2655f900e2dba2739756253314a34449a958032252ffa96cb1fd510ced99947441a9b7d5f703c559cfd895502080c2926ab7310cb6b5ebebf5d7e7010795999de285ce3d8fe5af4b572d586a9f5f865fd8c02a5420b8e187aa358ee8f3d5f657d88529cced2f1f14c6e4d0f05588350bedb9b8410a7b2d4b1ef2b6276d363828654f37b60978cb086522caaf6e9d7a55af5cb2b238fcac3347cec0b1e28015382b115e3fbd8d15f03335452d9aa4f8af6f9a93e3f09d760f445a3415986056335df3e0084fad6d514dea1bd4d5e3894cbecc165a63eb5f5e8695aea689e8870e2ccda83f85fb2efac577dd981df472161f3f9a829432b96f1f6cf280ffb1f06ceabada983372e548110a8af6ba810cffb66eb0c66a679126a4a1874422198ec895c144756e6306934db10a664ba5e90ebb6a555bf45b19a41f42eb10e9f44b0296313bbaf30cba40ea1c9d5a88abf828cdf2536e31723eeda3f79b7c655e48e4b03ad54e13cbd7035c3fb545c959b1b8d9feea2b03bcc97b2b8bf30292e88481dc884026a58a0e1c5ae999caeeb4ddfc029929f56b3163192618b09938ba7868818e048de4e9397c27924e625c7a7ef6938cf8d430b0a0667c47a888379a562cf94a42e80c8bac25622c107d61dd9cd2f2f58346b1db95fe922f5983c22ddf128d14a7f576c532fb1bdc523ee5491a9ea5de980336d8cd2c9c7c540962ad9d755707302e1d4dd65dcd38c1bf6ea9cdedbe0c45593e398782d06882fadd58f8d7ea36772de215432769f6ada5b2f744046ae5d12e32f3ddac382c0073f997ef802ae0e1fee303de5cab18a5fec7df2a1b0e6a504cdc78505b9e48b56cd473391e8eb6f34639d3e5c643c92ab02fa997e23cc35d384dbd3898f0ad4c92ef6dde035281c4e13ec9069953b0dc1393657aef391d84f6dc816603e431ea91507852b081c0c6a9eb1a7cca368e834ff8bf0a5138abd23536c660d3b1b67b323852d2577bcd59d6034fd5774b5d480e107ca633e6b19b5d5339d6cb1818437db3a9f602223aab8cbf8cd3fb116ccec8114c838e6f4fd6d0e222f88ac9dc8e34bf0a8145bff40e45805cd90051e199feae5b5cfd0feafb20bb935d2ab8015e5", 0x1000, 0x7fff}, {&(0x7f00000011c0)="6ab9ad57cfc4d58ee6695b793f080eb193163c9cd189d278e49f570c20315572951fea32415b41e786bbe0ebfc57376219c72edc9ada995b0c83c04c5d90293bfc1b06166193f7fede172ef7d4f8d6", 0x4f, 0x9}, {&(0x7f0000001240)="d4cc9ae623db38138bb9b4450765a0b139848d86c896da7edc93c487d25dc3ed1c617ee68012074c887f386d25020819c633d58a110b2d52f082c1a0820c1c20ae8ae3193ca9c0df9e6011dc9cd13670c349bfa0bbc4665f85d82dcbaf0f34e6fdae694fe82cc26d840d7614621a4a1d33232819608ab5c3016be22960a13d205f77299a5050c63ddbbca1b9f201d083eeabf3e0114c2a8d84f0630b355480a69c1890488564742c2f7bc67b8cf46c88", 0xb0, 0x5}, {&(0x7f0000001300)="4e4c6608c9a3cf4c6800f86cd7912dc3be5f7a05c3c8", 0x16, 0x1}, {&(0x7f0000001340)="8ab4f6a164c3fe67e8b1f782f26cc15d10505efe390c407fa30268b6d084f7eb5fa111b3240cd474490c9e9140cc8e6b95d15f46d6f72f0f274910570c0441db2dd1394af7bbf78f098925a7f0d302858877a5f96c0dd1aa5184e822da9953209767b70b194f043e26098e5ee60e676672fc7a61b68ec01d05bf9fc822a824623d08de94637a339a6ca7a5009eba", 0x8e, 0x12}], 0x0, &(0x7f0000001780)={[{@barrier='barrier'}], [{@dont_hash='dont_hash'}, {@audit='audit'}, {@uid_lt={'uid<', r2}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_lt={'uid<', r4}}, {@uid_eq={'uid', 0x3d, r5}}, {@uid_eq={'uid'}}]}) mkdir(&(0x7f0000001640)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000001b00)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000001980)=ANY=[@ANYPTR, @ANYRES32=r6, @ANYBLOB="6d07ca966cd821902d0eff1109f242122a24174e58cbd1c9a979825a038ec581cc19d0741f2735eae4d5da6ef86a0e6bacf8d2e3d0f1a498e74e038ebd8cdae2c14ae5678f778ee27084cedd5c85d40086ec5e827de61d146cf5f7e046156b0b55889d855dc425955e46f5513c933e69c4826f7495bd8f473e751c6a4d18c03aff0c58de842b40ee36af62be4937", @ANYRES64=r3, @ANYRESOCT=r0, @ANYRESDEC=r6, @ANYRESOCT, @ANYRESHEX=r1, @ANYPTR64, @ANYPTR64], @ANYRES32=r4, @ANYPTR=&(0x7f0000001ac0)=ANY=[@ANYRES32=r4, @ANYRESHEX=r6]]], &(0x7f0000000080)='./file0\x00', &(0x7f0000001bc0)='\xaa\v\x00\x00\x00\x84\x9d\xc9\xb5\xd1&\xaf\xf1\xf4\xca I^\x027xwzMv+\xac\xc7\x8c@\x02f\xa0c\xad:', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) 03:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1760.889397] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7400, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1761.238080] kauditd_printk_skb: 165 callbacks suppressed [ 1761.238096] audit: type=1400 audit(2000001395.820:55915): avc: denied { map } for pid=5411 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.406053] audit: type=1400 audit(2000001395.970:55916): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.543126] audit: type=1400 audit(2000001395.970:55917): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.755095] audit: type=1400 audit(2000001396.050:55918): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) [ 1762.033738] audit: type=1400 audit(2000001396.050:55919): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1762.150612] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xc]}}, 0x50) [ 1762.316109] audit: type=1400 audit(2000001396.140:55920): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:37 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0xfffffffffffffffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x4002091, r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000006c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB="010428bd7000fbd0df1072ce16658eac221f4b6cecebf45fa5a697c1909534df251302009c6bbc936705"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x40080) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001100), 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) 03:56:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x3, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1762.531502] audit: type=1400 audit(2000001396.150:55921): avc: denied { map } for pid=5416 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) sendmsg$nl_crypto(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@upd={0xe8, 0x12, 0x0, 0x70bd2a, 0x25dfdbfd, {{'drbg_pr_ctr_aes256\x00'}, [], [], 0x2400}, [{0x8, 0x1, 0x4}]}, 0xe8}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2c5b010000000000000007"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:56:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1762.718527] audit: type=1400 audit(2000001396.150:55922): avc: denied { map } for pid=5416 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1762.856363] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1762.862310] audit: type=1400 audit(2000001396.150:55923): avc: denied { map } for pid=5411 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1763.341624] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xffffff9e, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1763.582121] ceph: device name is missing path (no : separator in .,[) 03:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x50) 03:56:38 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r0) 03:56:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}}, 0x50) [ 1764.734476] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1764.911529] libceph: resolve ' [ 1764.911529] d.Fp] [ 1764.911529] .' (ret=-3): failed 03:56:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1764.999898] libceph: parse_ips bad ip ' [ 1764.999898] d.Fp] [ 1764.999898] .,[' 03:56:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) [ 1765.182886] libceph: resolve ' [ 1765.182886] d.Fp] [ 1765.182886] .' (ret=-3): failed 03:56:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 1765.297971] libceph: parse_ips bad ip ' [ 1765.297971] d.Fp] [ 1765.297971] .,[' 03:56:40 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'bridge_slave_0\x00', @random="01003a1e2410"}) mount(&(0x7f0000000280)=ANY=[@ANYRESDEC=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000003c0)=""/230) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000180)={0x4, 0x3, @start={0x2, 0x1}}) write$P9_RWALK(r3, &(0x7f00000004c0)={0x64, 0x6f, 0x1, {0x7, [{0x92, 0x1, 0x2}, {0x60, 0x1, 0x3}, {0x4, 0x1, 0x3}, {0x81, 0x0, 0x8}, {0x88, 0x2, 0x5}, {0x1, 0x2, 0x3}, {0x40, 0x1}]}}, 0x64) clock_gettime(0x20000000000, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000200)={0x5fc, 0x6, 0x4, 0x10010, {r4, r5/1000+30000}, {0x5, 0x0, 0x5, 0x200, 0x301, 0x0, "f15bb50a"}, 0x52a1, 0x1, @planes=&(0x7f00000000c0)={0x3, 0x2, @userptr=0x1, 0xfffffffffffffffa}, 0x4}) 03:56:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) [ 1765.986985] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x68000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1766.252162] kauditd_printk_skb: 169 callbacks suppressed [ 1766.252191] audit: type=1400 audit(2000001400.920:56088): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1766.378283] ceph: device name is missing path (no : separator in 00000000000000000003) [ 1766.391528] audit: type=1400 audit(2000001400.960:56089): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703]}}, 0x50) [ 1766.544543] audit: type=1400 audit(2000001401.010:56090): avc: denied { map } for pid=5502 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:41 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1766.675752] ceph: device name is missing path (no : separator in 00000000000000000010) [ 1766.737985] audit: type=1400 audit(2000001401.050:56091): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1766.881206] audit: type=1400 audit(2000001401.050:56092): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1767.008345] audit: type=1400 audit(2000001401.160:56093): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.055288] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x400000) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\nd.FW]\n.,[:\x00'], &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='ext4\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) [ 1767.229632] audit: type=1400 audit(2000001401.180:56094): avc: denied { map } for pid=5502 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) 03:56:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x8004, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1767.377981] audit: type=1400 audit(2000001401.180:56095): avc: denied { map } for pid=5510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.561536] audit: type=1400 audit(2000001401.240:56096): avc: denied { map } for pid=5510 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.678426] audit: type=1400 audit(2000001401.250:56097): avc: denied { map } for pid=5510 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:42 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x50) 03:56:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB=',rootcontext=s']) [ 1768.256515] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7a, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:43 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) [ 1769.267260] SELinux: security_context_str_to_sid(s) failed for (dev ramfs, type ramfs) errno=-22 [ 1769.403926] SELinux: security_context_str_to_sid(s) failed for (dev ramfs, type ramfs) errno=-22 03:56:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x9effffff00000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x50) 03:56:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000000000}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0xfffffffffffffffc, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:56:44 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1770.243555] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x10000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:45 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_group_source_req(r1, 0x0, 0x30, &(0x7f0000000400)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 03:56:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) [ 1771.270343] kauditd_printk_skb: 158 callbacks suppressed [ 1771.270357] audit: type=1400 audit(2000001405.940:56256): avc: denied { map } for pid=5595 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.351803] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1771.416064] audit: type=1400 audit(2000001405.980:56257): avc: denied { create } for pid=5596 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7400000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1771.609441] audit: type=1400 audit(2000001406.010:56258): avc: denied { write } for pid=5596 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1771.798252] audit: type=1400 audit(2000001406.020:56259): avc: denied { map } for pid=5595 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:46 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000]}}, 0x50) [ 1771.988024] audit: type=1400 audit(2000001406.020:56260): avc: denied { map } for pid=5595 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.158260] audit: type=1400 audit(2000001406.070:56262): avc: denied { map } for pid=5595 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.318039] audit: type=1400 audit(2000001406.070:56263): avc: denied { map } for pid=5595 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1772.512687] audit: type=1400 audit(2000001406.070:56261): avc: denied { create } for pid=5596 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1772.572708] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1772.658000] audit: type=1400 audit(2000001406.160:56264): avc: denied { map } for pid=5601 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6800, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1772.825035] audit: type=1400 audit(2000001406.160:56265): avc: denied { map } for pid=5601 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x50) 03:56:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:47 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xc000000]}}, 0x50) [ 1773.708320] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_create(0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) semctl$SETALL(0x0, 0x0, 0x11, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x33a) write$binfmt_aout(r0, 0x0, 0x0) 03:56:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x17f, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47030000]}}, 0x50) 03:56:48 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:56:49 executing program 0: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001300)={[{@lazytime='lazytime'}, {@background_gc_on='background_gc=on'}, {@prjquota={'prjquota', 0x3d, '/dev/usbmon#\x00'}}, {@nouser_xattr='nouser_xattr'}, {@adaptive_mode='mode=adaptive'}, {@usrjquota={'usrjquota', 0x3d, '/dev/usbmon#\x00'}}], [{@smackfshat={'smackfshat', 0x3d, '/dev/usbmon#\x00'}}, {@appraise_type='appraise_type=imasig'}]}) [ 1774.918297] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6000000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:49 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:56:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:50 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000101000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6002290f00303a0000000000000000000000ffff0000000098fbde02636ac0c000000000000000010200907800000000609433df0000000000000000000000000000000000000001fe800000000000000b00000000000000"], 0x0) [ 1775.841202] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x1000000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:50 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:56:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1776.318743] kauditd_printk_skb: 161 callbacks suppressed [ 1776.318757] audit: type=1400 audit(2000001410.990:56427): avc: denied { map } for pid=5687 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.487736] audit: type=1400 audit(2000001411.070:56428): avc: denied { map } for pid=5687 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) [ 1776.731700] audit: type=1400 audit(2000001411.090:56429): avc: denied { map } for pid=5687 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:51 executing program 0: [ 1776.908099] audit: type=1400 audit(2000001411.310:56430): avc: denied { map } for pid=5693 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:51 executing program 5: ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x35) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1777.000848] audit: type=1400 audit(2000001411.310:56431): avc: denied { map } for pid=5693 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1777.007352] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1777.139518] audit: type=1400 audit(2000001411.310:56432): avc: denied { map } for pid=5693 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xd00a0000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1777.318007] audit: type=1400 audit(2000001411.360:56433): avc: denied { map } for pid=5693 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1777.479815] audit: type=1400 audit(2000001411.510:56434): avc: denied { map } for pid=5693 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10]}}, 0x50) [ 1777.602798] audit: type=1400 audit(2000001411.550:56435): avc: denied { map } for pid=5693 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1777.731736] audit: type=1400 audit(2000001411.550:56436): avc: denied { map } for pid=5693 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:52 executing program 0: 03:56:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1778.220525] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1778.349140] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 03:56:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xe00, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:53 executing program 0: 03:56:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:53 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1779.469500] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xa000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:54 executing program 0: 03:56:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4703000000000000]}}, 0x50) 03:56:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) [ 1780.539608] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:55 executing program 0: 03:56:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4703, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1781.349726] kauditd_printk_skb: 151 callbacks suppressed [ 1781.349742] audit: type=1400 audit(2000001416.020:56588): avc: denied { map } for pid=5767 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1781.606205] audit: type=1400 audit(2000001416.050:56589): avc: denied { map } for pid=5767 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:56 executing program 0: 03:56:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) [ 1781.799492] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1781.813303] audit: type=1400 audit(2000001416.080:56590): avc: denied { map } for pid=5769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x74, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1781.939195] audit: type=1400 audit(2000001416.090:56591): avc: denied { map } for pid=5769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.099982] audit: type=1400 audit(2000001416.110:56592): avc: denied { map } for pid=5769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1782.338035] audit: type=1400 audit(2000001416.120:56593): avc: denied { map } for pid=5767 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.505510] audit: type=1400 audit(2000001416.130:56594): avc: denied { map } for pid=5771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.614272] audit: type=1400 audit(2000001416.130:56595): avc: denied { map } for pid=5771 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:57 executing program 0: [ 1782.722985] audit: type=1400 audit(2000001416.130:56596): avc: denied { map } for pid=5769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.849764] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1782.893171] audit: type=1400 audit(2000001416.130:56597): avc: denied { map } for pid=5771 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x20000290) 03:56:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x500000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:56:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) 03:56:58 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:58 executing program 0: 03:56:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1783.899395] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x600000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:56:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0xf) 03:56:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:56:59 executing program 0: 03:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:56:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1784.999579] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:56:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xfffffff0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:00 executing program 0: 03:57:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0xfffffffffffffdef) 03:57:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1785.951302] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x74000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:01 executing program 0: 03:57:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1786.513469] kauditd_printk_skb: 168 callbacks suppressed [ 1786.513484] audit: type=1400 audit(2000001421.180:56766): avc: denied { map } for pid=5852 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1786.661507] audit: type=1400 audit(2000001421.180:56767): avc: denied { map } for pid=5852 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1786.775898] audit: type=1400 audit(2000001421.240:56768): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0xfffffdef) [ 1786.978023] audit: type=1400 audit(2000001421.240:56769): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1787.024599] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1787.131565] audit: type=1400 audit(2000001421.300:56770): avc: denied { map } for pid=5852 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf0ffffffffffff, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1787.242695] audit: type=1400 audit(2000001421.360:56771): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:02 executing program 0: [ 1787.420527] audit: type=1400 audit(2000001421.360:56772): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.599624] audit: type=1400 audit(2000001421.420:56773): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.757804] audit: type=1400 audit(2000001421.440:56774): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) [ 1787.919182] audit: type=1400 audit(2000001421.530:56775): avc: denied { map } for pid=5852 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.926340] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf0ffff, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x210007da, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c726f6f74636f6e746578743d73e164d3ae1b26558e2e12"]) 03:57:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0xfdef) 03:57:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des3_ede)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="de75e1fe7d087634b214a3765ba0017995103a08917fc2a1", 0x18) sendmmsg$alg(r1, &(0x7f00000019c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 03:57:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) [ 1789.252980] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1789.393034] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x40000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:04 executing program 3: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x1, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x81, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000400)={0x8e, &(0x7f0000000340)=""/142}) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="666435fd61b8bf3f0e2368a8bfda79799c3de9b1a74cc199f58da9df47a4515b08e741", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000000580), 0xefee) syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x1f, 0x10802) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x3, 0x1000000000000000, 0x9, 0xc000000}}, 0x50) mkdirat(r1, &(0x7f0000000440)='./file0\x00', 0x120) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200001, 0x0) poll(&(0x7f0000000300)=[{r1}, {r3, 0x4004}, {r2, 0x20}, {r0, 0x40}], 0x4, 0x400) 03:57:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1790.360186] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) 03:57:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xfffffffffffff000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000005d00)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) 03:57:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1791.535605] kauditd_printk_skb: 205 callbacks suppressed [ 1791.535622] audit: type=1400 audit(2000001426.200:56981): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1791.626921] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1791.748007] audit: type=1400 audit(2000001426.270:56982): avc: denied { create } for pid=5958 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xff030000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) [ 1791.928742] audit: type=1400 audit(2000001426.280:56983): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.117979] audit: type=1400 audit(2000001426.290:56984): avc: denied { write } for pid=5958 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1792.318022] audit: type=1400 audit(2000001426.320:56985): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.540334] audit: type=1400 audit(2000001426.340:56986): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) setpriority(0x3, r2, 0x6) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=staff_u,obj_role=/dev/fuse\x00,dont_appraise,fowner=', @ANYRESDEC=r1, @ANYBLOB="2c32c46d51a0a507b034dbc07d516673636f6e746578743d75636f6e66696e656c5f752c6673636f6e746578743d737973", @ANYRESDEC=r1, @ANYBLOB="2c006c69a067e735f783fb79502792d737d89a2a759f3bdffd336b30c2d832921982fb0ce13f51af3c83a88d48c543054987442e27088ef1e1a40ed214d052163b4a6b7ec06e054464e994dd4194510724e9f29beaa21c9de2fdcf000ace78a56c3916dd40d32632d9ff14702dd82d1fe4d5d83f2c6cae46b569b4b0d8ad23e67eb172f49bee98c0b898e25b726f1e8ac68850d8a0c2263c33c758e15d0da6685cb16b99e443350a638031f724bed67653640b34f03eb609b623fa3eb94d22cc02f2a6982606f17d54607faf5e43b18a5340a0"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000002c0)='veth1_to_team\x00', 0x10) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000001c0)=0x67) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000300), 0xfffffffffffffd67) 03:57:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xffffffffffffbffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000094000/0x400000)=nil, 0x400000) mmap(&(0x7f00001ed000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 1792.734011] audit: type=1400 audit(2000001426.370:56987): avc: denied { create } for pid=5958 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1792.772959] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1792.889187] audit: type=1400 audit(2000001426.380:56988): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1793.098572] audit: type=1400 audit(2000001426.450:56989): avc: denied { map } for pid=5957 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1793.280169] audit: type=1400 audit(2000001426.820:56990): avc: denied { map } for pid=5968 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1793.780054] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:08 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="6ca195c39b65543da267dcef390e0000070100010024000080586d60aeba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764526b4c2db6811b60f40c00c4734925d598d3181aefc400e308d3ed46c336a5e76e2f82f7b0c4fb9b914e00000000000000fd"], 0x74) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in6, @in=@loopback, 0x4e21, 0x7ff, 0x4e23, 0x0, 0x2, 0xa0, 0x0, 0x87}, {0x6, 0x2, 0x400, 0x1, 0x2, 0x8001, 0x80000001}, {0x5, 0x3, 0x7f, 0xc0ea}, 0x0, 0x6e6bb4, 0x0, 0x1, 0x2}, {{@in6=@loopback, 0x4d5, 0x7e}, 0x2, @in=@loopback, 0x3afa, 0x0, 0x2, 0x0, 0x6, 0x101, 0x401}}, 0xe8) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000180)=0x1000, 0x4) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) fgetxattr(r0, &(0x7f0000000000)=@random={'user.', '\xf0\x00'}, &(0x7f00000002c0)=""/167, 0xa7) fstat(r2, &(0x7f00000003c0)) 03:57:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4c00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0xf487, 0x0, 0x0, 0x4}) fstat(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000001580)='fuse\x00', 0x1000000, &(0x7f0000001640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@dont_appraise='dont_appraise'}]}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x0, &(0x7f0000001740)) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x1, {0x1, 0x1, 0x2, 0x6, 0x8, 0x5, {0x5, 0x9, 0x8, 0x7f, 0x20, 0x6, 0x5, 0xffff, 0x353, 0x5, 0x80000001, r5, 0x0, 0x0, 0xf52}}}, 0x90) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2, 0x100}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) listxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=""/84, 0x54) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000001700)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 03:57:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) [ 1794.801676] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x50000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 03:57:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0xfffffdef) [ 1795.760974] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x40000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) [ 1796.580467] kauditd_printk_skb: 147 callbacks suppressed [ 1796.580480] audit: type=1400 audit(2000001431.250:57138): avc: denied { map } for pid=6050 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.708764] audit: type=1400 audit(2000001431.300:57139): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.833944] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1796.921835] audit: type=1400 audit(2000001431.310:57140): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x5000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) [ 1797.126529] audit: type=1400 audit(2000001431.360:57141): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.288164] audit: type=1400 audit(2000001431.370:57142): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) [ 1797.447146] audit: type=1400 audit(2000001431.440:57143): avc: denied { map } for pid=6053 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1797.595193] audit: type=1400 audit(2000001431.440:57144): avc: denied { map } for pid=6053 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.728190] audit: type=1400 audit(2000001431.460:57145): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) [ 1797.927409] audit: type=1400 audit(2000001431.460:57146): avc: denied { map } for pid=6050 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000$0000000000000=\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1798.086974] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1798.097549] audit: type=1400 audit(2000001431.480:57148): avc: denied { map } for pid=6053 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf0, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:57:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1798.982978] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xa00, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) 03:57:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) r2 = getegid() r3 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x2041000, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@uid_lt={'uid<', r3}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 03:57:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clock_gettime(0x3, &(0x7f0000000400)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000040)={0x0, r1+10000000}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="77c3fc1789d733bdf73c61014f1f2f1a1003a9652adeff071f8954ae1623bd8c549f8c247e636c3949c44b78356ef21386eae8400fa16df6e33b2339988bfde735522b3bfa842b68faf6588c9710da7077dfc969886dd4206ca4486d7db3a515d3aff6074bd0e62728111bdb558d7dddc83f38de8507a8685699158ff0ce03d1ead3a7692b0fc95502c4f15d8fee42a525c0fb4e88a961fbbea2513589d6"], 0x1}}, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000380)=0x10) r3 = getpid() syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r5, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000480)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x17}, 0x2}, @in6={0xa, 0x4e23, 0x400, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x3, @loopback, 0x2ed}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @ipv4={[], [], @local}, 0x6b}, @in={0x2, 0x4e21, @local}], 0xa0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x4, 0x4) tkill(r0, 0x1004000000016) mount(&(0x7f00000003c0)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='ceph\x00', 0x6, 0x0) [ 1800.079847] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x5, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:15 executing program 5: msgrcv(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000df795935a70ff299b30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1, 0x0, 0xa4a3ad41a879dde0) 03:57:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) 03:57:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1801.209618] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x5000000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:16 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1801.640905] kauditd_printk_skb: 164 callbacks suppressed [ 1801.640920] audit: type=1400 audit(2000001436.310:57312): avc: denied { map } for pid=6139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) [ 1801.844357] audit: type=1400 audit(2000001436.310:57313): avc: denied { map } for pid=6130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.047990] audit: type=1400 audit(2000001436.310:57314): avc: denied { map } for pid=6130 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.229157] audit: type=1400 audit(2000001436.380:57315): avc: denied { map } for pid=6139 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e393c7ad78292fe81ad597b0a656a6054cdba370e45c9a201252981f3a5e23"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2, 0x1) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000100)={{0x5, 0x1, 0x3ff, 0x952}, 'syz0\x00', 0x18}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x11}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) clone(0x100, &(0x7f00000001c0)="a0be8f8768c2626447b7f6ac6f643ff30209b5de467e2c41bc0a25d3962b61134f907d89f6fbd7eb2364739f3d99c484d699e9761c13733cedec", &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="6c7c953198fbab8b97439182b404cdcd8291ff14627af0b8e33e6032f790598f19c95c257e863030c2ae52d3fa4e059410aaa3d2f0d2eb767155754abdcad8c9b6ed15e62711962a3f35027e2c5a2914bc200a927153f49debd9e536f32450eda4cb21d8d3eee1b94a540b87368c2be25a29a914e13d5d285f13e1cbdc306560df443757") socket$inet6_tcp(0xa, 0x1, 0x0) [ 1802.367399] audit: type=1400 audit(2000001436.390:57316): avc: denied { map } for pid=6139 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1802.509914] audit: type=1400 audit(2000001436.390:57317): avc: denied { map } for pid=6139 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.589948] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:17 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1802.678057] audit: type=1400 audit(2000001436.460:57318): avc: denied { map } for pid=6139 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.844615] audit: type=1400 audit(2000001436.520:57319): avc: denied { map } for pid=6139 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.979520] libceph: resolve ' [ 1802.979520] d.Fp] [ 1802.979520] .' (ret=-3): failed [ 1803.001578] libceph: parse_ips bad ip ' [ 1803.001578] d.Fp] [ 1803.001578] .,[' [ 1803.006521] audit: type=1400 audit(2000001436.530:57320): avc: denied { map } for pid=6139 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1803.238973] audit: type=1400 audit(2000001436.610:57321): avc: denied { map } for pid=6139 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clock_gettime(0x3, &(0x7f0000000400)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000040)={0x0, r1+10000000}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="77c3fc1789d733bdf73c61014f1f2f1a1003a9652adeff071f8954ae1623bd8c549f8c247e636c3949c44b78356ef21386eae8400fa16df6e33b2339988bfde735522b3bfa842b68faf6588c9710da7077dfc969886dd4206ca4486d7db3a515d3aff6074bd0e62728111bdb558d7dddc83f38de8507a8685699158ff0ce03d1ead3a7692b0fc95502c4f15d8fee42a525c0fb4e88a961fbbea2513589d6"], 0x1}}, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000340)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000380)=0x10) r3 = getpid() syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r5, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000480)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x17}, 0x2}, @in6={0xa, 0x4e23, 0x400, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x3, @loopback, 0x2ed}, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @ipv4={[], [], @local}, 0x6b}, @in={0x2, 0x4e21, @local}], 0xa0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x4, 0x4) tkill(r0, 0x1004000000016) mount(&(0x7f00000003c0)=@nullb='\nd.Fp]\n.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='ceph\x00', 0x6, 0x0) 03:57:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x60000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:18 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groqp_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x6, 0x0, 0x0, 0x0, 0xc000020}}, 0x50) 03:57:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) 03:57:18 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 1803.769069] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c00, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001580), 0x1000) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x3, 0x2, {0x7, 0x1b, 0x2, 0x0, 0x0, 0x0, 0x4, 0xc000000}}, 0x50) 03:57:19 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 03:57:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) 03:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1806.256683] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1806.293960] libceph: resolve ' [ 1806.293960] d.Fp] [ 1806.293960] .' (ret=-3): failed [ 1806.468182] libceph: parse_ips bad ip ' [ 1806.468182] d.Fp] [ 1806.468182] .,[' [ 1806.707804] kauditd_printk_skb: 157 callbacks suppressed [ 1806.707818] audit: type=1400 audit(2000001441.370:57479): avc: denied { map } for pid=6219 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1806.815321] audit: type=1400 audit(2000001441.420:57480): avc: denied { map } for pid=6219 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:21 executing program 0 (fault-call:0 fault-nth:0): msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1806.907975] audit: type=1400 audit(2000001441.430:57481): avc: denied { map } for pid=6219 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8fc912a51d94ce208853623e298dae052b8153b7cd30a7278984df168aca14493274943c55bf543d1dec19eb0a9c0861616ffc3e192f133b4f27f5f0e9378ff5239deb996897de20bf9aa221c99647fa2c5b4e5755e19aafa7be52262a56097239e8ed8ca42b33ae3a4586173db77c9c4f30c049a4d9d120e1d3f38622299319809210bcd62c0d1c57", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x800000000000000}}, 0x50) 03:57:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:57:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x48, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1807.117058] audit: type=1400 audit(2000001441.440:57482): avc: denied { map } for pid=6219 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.248225] audit: type=1400 audit(2000001441.460:57483): avc: denied { map } for pid=6220 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.282352] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1807.411913] audit: type=1400 audit(2000001441.460:57484): avc: denied { map } for pid=6220 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2e67523008703969643d5b6a3641d75a6417a895f6a6220293c9f60e4ff0d94e0deb8272895f5a03b1a7fb40cefdb703cfb96d848bb956a34070569f924a2f1a641788fa66fb4d3730e054284b4e72e3ca48e6a4fa102c2e14e83f6d08d066b711eca16a1012cc3fdee3f97c49c15df2fb3297184c5913863505279f2d7fa3b8d81ef1c7d55bf368c3db855dec6d770936b6b594058433c0606c5e2fe03fb9fdb1c29a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x40002, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000001c0)) setxattr$security_smack_transmute(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ksm_device_t:s0\x00', 0x22, 0x1) 03:57:22 executing program 5 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) [ 1807.586201] audit: type=1400 audit(2000001441.470:57485): avc: denied { map } for pid=6220 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.788397] audit: type=1400 audit(2000001441.470:57486): avc: denied { map } for pid=6220 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1807.984727] audit: type=1400 audit(2000001441.520:57487): avc: denied { map } for pid=6220 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.018156] FAULT_INJECTION: forcing a failure. [ 1808.018156] name failslab, interval 1, probability 0, space 0, times 0 [ 1808.068061] CPU: 1 PID: 6239 Comm: syz-executor0 Not tainted 4.20.0+ #170 [ 1808.075015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1808.084367] Call Trace: [ 1808.086991] dump_stack+0x1d3/0x2c6 [ 1808.090647] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1808.095853] ? dput.part.25+0x26d/0x790 [ 1808.099844] should_fail.cold.4+0xa/0x17 [ 1808.103913] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1808.109040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.114600] ? _parse_integer+0x134/0x180 [ 1808.118777] ? graph_lock+0x270/0x270 [ 1808.122591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1808.128151] ? _kstrtoull+0x188/0x250 [ 1808.131970] ? find_held_lock+0x36/0x1c0 [ 1808.136059] ? ___might_sleep+0x1ed/0x300 [ 1808.140229] ? lock_downgrade+0x900/0x900 [ 1808.144395] ? arch_local_save_flags+0x40/0x40 [ 1808.148999] __should_failslab+0x124/0x180 [ 1808.153243] should_failslab+0x9/0x14 [ 1808.157051] __kmalloc+0x2e0/0x770 [ 1808.160615] ? lock_downgrade+0x900/0x900 [ 1808.164867] ? load_msg+0x42/0x320 [ 1808.168423] load_msg+0x42/0x320 [ 1808.171806] do_msgrcv+0x294/0x1770 [ 1808.175444] ? copy_compat_msqid_to_user+0x950/0x950 [ 1808.180582] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1808.185536] ? wait_for_completion+0x8a0/0x8a0 [ 1808.190167] ? do_msgsnd+0x1780/0x1780 [ 1808.194074] ? __lock_is_held+0xb5/0x140 [ 1808.198186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.203735] ? check_preemption_disabled+0x48/0x280 [ 1808.208774] ? __sb_end_write+0xd9/0x110 [ 1808.212853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1808.218398] ? fput+0x130/0x1a0 [ 1808.218426] ? do_syscall_64+0x9a/0x820 [ 1808.218443] ? do_syscall_64+0x9a/0x820 [ 1808.218461] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1808.234262] ? trace_hardirqs_on+0xbd/0x310 [ 1808.238610] ? __ia32_sys_read+0xb0/0xb0 [ 1808.242344] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1808.242687] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1808.255747] __x64_sys_msgrcv+0xc5/0x150 [ 1808.255761] ? __x64_sys_msgrcv+0xc5/0x150 [ 1808.255781] do_syscall_64+0x1b9/0x820 [ 1808.267967] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1808.273383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1808.278337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.283204] ? trace_hardirqs_on_caller+0x310/0x310 [ 1808.288229] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1808.293273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.298835] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1808.303899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.308779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1808.313991] RIP: 0033:0x4579b9 [ 1808.317194] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1808.336112] RSP: 002b:00007fe30f4e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 1808.343826] RAX: ffffffffffffffda RBX: 00007fe30f4e7c90 RCX: 00000000004579b9 [ 1808.351122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1808.358395] RBP: 000000000073bf00 R08: a4a3ad41a879dde0 R09: 0000000000000000 [ 1808.365672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe30f4e86d4 [ 1808.372978] R13: 00000000004c37ec R14: 00000000004d6480 R15: 0000000000000003 03:57:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x400000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1808.464470] audit: type=1400 audit(2000001441.540:57488): avc: denied { map } for pid=6220 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.764151] FAULT_INJECTION: forcing a failure. [ 1808.764151] name failslab, interval 1, probability 0, space 0, times 0 [ 1808.845418] CPU: 1 PID: 6253 Comm: syz-executor5 Not tainted 4.20.0+ #170 [ 1808.852371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1808.861733] Call Trace: [ 1808.864335] dump_stack+0x1d3/0x2c6 [ 1808.867995] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1808.873205] ? dput.part.25+0x26d/0x790 [ 1808.877199] should_fail.cold.4+0xa/0x17 [ 1808.881277] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1808.886405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.891961] ? _parse_integer+0x134/0x180 [ 1808.896167] ? graph_lock+0x270/0x270 [ 1808.899995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1808.905556] ? _kstrtoull+0x188/0x250 [ 1808.909371] ? find_held_lock+0x36/0x1c0 [ 1808.913468] ? ___might_sleep+0x1ed/0x300 [ 1808.917627] ? lock_downgrade+0x900/0x900 [ 1808.921783] ? arch_local_save_flags+0x40/0x40 [ 1808.926406] __should_failslab+0x124/0x180 [ 1808.930659] should_failslab+0x9/0x14 [ 1808.934530] __kmalloc+0x2e0/0x770 [ 1808.938079] ? lock_downgrade+0x900/0x900 [ 1808.942248] ? load_msg+0x42/0x320 [ 1808.945801] load_msg+0x42/0x320 [ 1808.949183] do_msgrcv+0x294/0x1770 [ 1808.952824] ? copy_compat_msqid_to_user+0x950/0x950 [ 1808.957938] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1808.962887] ? wait_for_completion+0x8a0/0x8a0 [ 1808.967480] ? do_msgsnd+0x1780/0x1780 [ 1808.971382] ? __lock_is_held+0xb5/0x140 [ 1808.975465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.981011] ? check_preemption_disabled+0x48/0x280 [ 1808.986045] ? __sb_end_write+0xd9/0x110 [ 1808.990149] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1808.995697] ? fput+0x130/0x1a0 [ 1808.998992] ? do_syscall_64+0x9a/0x820 [ 1809.002974] ? do_syscall_64+0x9a/0x820 [ 1809.006959] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1809.011601] ? trace_hardirqs_on+0xbd/0x310 [ 1809.015930] ? __ia32_sys_read+0xb0/0xb0 [ 1809.020003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1809.025387] __x64_sys_msgrcv+0xc5/0x150 [ 1809.029235] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1809.029459] ? __x64_sys_msgrcv+0xc5/0x150 [ 1809.041391] do_syscall_64+0x1b9/0x820 [ 1809.045287] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1809.050695] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1809.055634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1809.060486] ? trace_hardirqs_on_caller+0x310/0x310 [ 1809.065514] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1809.070541] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1809.075571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1809.080476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1809.085671] RIP: 0033:0x4579b9 [ 1809.088870] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1809.107773] RSP: 002b:00007f2b3899dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 1809.115488] RAX: ffffffffffffffda RBX: 00007f2b3899dc90 RCX: 00000000004579b9 [ 1809.122762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1809.130038] RBP: 000000000073bf00 R08: a4a3ad41a879dde0 R09: 0000000000000000 [ 1809.137314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b3899e6d4 03:57:23 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x480, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1809.144589] R13: 00000000004c37ec R14: 00000000004d6480 R15: 0000000000000005 03:57:23 executing program 5 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 03:57:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000140)=0x8) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x6, @remote}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0xfffffffffffffffe}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000340)) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@sha1={0x1, "5548413a8547f3b5ad1642bde6f1f31d11be2380"}, 0x15, 0x2) 03:57:24 executing program 0: msgrcv(0x0, 0x0, 0x100000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1809.878260] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x48000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1810.195180] FAULT_INJECTION: forcing a failure. [ 1810.195180] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.276509] CPU: 0 PID: 6274 Comm: syz-executor5 Not tainted 4.20.0+ #170 [ 1810.283462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1810.292818] Call Trace: [ 1810.295434] dump_stack+0x1d3/0x2c6 [ 1810.299106] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1810.304381] ? is_bpf_text_address+0xd3/0x170 [ 1810.308925] should_fail.cold.4+0xa/0x17 [ 1810.312997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1810.318168] ? save_stack+0x43/0xd0 [ 1810.321806] ? kasan_kmalloc+0xc7/0xe0 [ 1810.325715] ? __kmalloc+0x15b/0x770 [ 1810.329431] ? load_msg+0x42/0x320 [ 1810.332986] ? find_held_lock+0x36/0x1c0 [ 1810.337103] ? ___might_sleep+0x1ed/0x300 [ 1810.341276] ? arch_local_save_flags+0x40/0x40 [ 1810.345863] ? __might_fault+0x12b/0x1e0 [ 1810.349944] __should_failslab+0x124/0x180 [ 1810.354207] should_failslab+0x9/0x14 [ 1810.358020] kmem_cache_alloc_trace+0x2d7/0x750 [ 1810.362738] selinux_msg_msg_alloc_security+0x47/0xd0 [ 1810.367974] security_msg_msg_alloc+0x4c/0xa0 [ 1810.372480] load_msg+0x2a3/0x320 [ 1810.375947] do_msgrcv+0x294/0x1770 [ 1810.379582] ? copy_compat_msqid_to_user+0x950/0x950 [ 1810.384722] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1810.389667] ? wait_for_completion+0x8a0/0x8a0 [ 1810.394265] ? do_msgsnd+0x1780/0x1780 [ 1810.398175] ? __lock_is_held+0xb5/0x140 [ 1810.402266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.407817] ? check_preemption_disabled+0x48/0x280 [ 1810.412849] ? __sb_end_write+0xd9/0x110 [ 1810.416924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1810.422941] ? fput+0x130/0x1a0 [ 1810.426234] ? do_syscall_64+0x9a/0x820 [ 1810.430217] ? do_syscall_64+0x9a/0x820 [ 1810.434213] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1810.438800] ? trace_hardirqs_on+0xbd/0x310 [ 1810.443145] ? __ia32_sys_read+0xb0/0xb0 [ 1810.447217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1810.452599] __x64_sys_msgrcv+0xc5/0x150 [ 1810.456715] ? __x64_sys_msgrcv+0xc5/0x150 [ 1810.460962] do_syscall_64+0x1b9/0x820 [ 1810.464852] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1810.470229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1810.475171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1810.480024] ? trace_hardirqs_on_caller+0x310/0x310 [ 1810.485049] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1810.490132] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1810.495171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1810.500025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1810.505222] RIP: 0033:0x4579b9 [ 1810.508422] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1810.527327] RSP: 002b:00007f2b3899dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 1810.535059] RAX: ffffffffffffffda RBX: 00007f2b3899dc90 RCX: 00000000004579b9 [ 1810.542346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1810.549635] RBP: 000000000073bf00 R08: a4a3ad41a879dde0 R09: 0000000000000000 [ 1810.556909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b3899e6d4 [ 1810.564188] R13: 00000000004c37ec R14: 00000000004d6480 R15: 0000000000000005 03:57:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:25 executing program 0: msgrcv(0x0, 0x0, 0x4000000, 0x0, 0xa4a3ad41a879dde0) 03:57:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:57:25 executing program 5 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="8000"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0xc6b) [ 1811.045880] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7f01, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:26 executing program 0: msgrcv(0x0, 0x0, 0x4703000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1811.731757] kauditd_printk_skb: 163 callbacks suppressed [ 1811.731773] audit: type=1400 audit(2000001446.400:57652): avc: denied { map } for pid=6293 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.879263] audit: type=1400 audit(2000001446.400:57653): avc: denied { map } for pid=6293 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.022278] audit: type=1400 audit(2000001446.450:57654): avc: denied { map } for pid=6293 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.178423] audit: type=1400 audit(2000001446.450:57655): avc: denied { map } for pid=6293 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7f010000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1812.360776] FAULT_INJECTION: forcing a failure. [ 1812.360776] name failslab, interval 1, probability 0, space 0, times 0 03:57:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x10000, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0xfffffffffffffffe, 0x5, {0x7, 0x1c, 0xa51, 0x100120, 0x2, 0x1f, 0x8001, 0x4}}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1812.408151] audit: type=1400 audit(2000001446.470:57656): avc: denied { map } for pid=6296 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.498112] CPU: 1 PID: 6307 Comm: syz-executor5 Not tainted 4.20.0+ #170 [ 1812.505063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1812.514426] Call Trace: [ 1812.517033] dump_stack+0x1d3/0x2c6 [ 1812.520681] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1812.525904] ? mark_held_locks+0x130/0x130 [ 1812.530186] should_fail.cold.4+0xa/0x17 [ 1812.534287] ? flex_array_get_ptr+0x49/0x60 [ 1812.538665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1812.543784] ? context_struct_compute_av+0x1600/0x1600 [ 1812.549126] ? up_write+0x7b/0x220 [ 1812.553157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1812.558709] ? graph_lock+0x270/0x270 [ 1812.562521] ? flex_array_get_ptr+0x49/0x60 [ 1812.566865] ? avtab_search_node+0x425/0x550 [ 1812.571303] ? graph_lock+0x270/0x270 [ 1812.575118] ? find_held_lock+0x36/0x1c0 [ 1812.577968] audit: type=1400 audit(2000001446.490:57657): avc: denied { map } for pid=6296 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.579194] ? find_held_lock+0x36/0x1c0 [ 1812.605282] __should_failslab+0x124/0x180 [ 1812.609533] should_failslab+0x9/0x14 [ 1812.613360] kmem_cache_alloc+0x47/0x730 [ 1812.617426] ? trace_hardirqs_on+0xbd/0x310 [ 1812.621754] ? kasan_check_read+0x11/0x20 [ 1812.625913] ? avc_compute_av+0x2c5/0x800 [ 1812.630073] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1812.635552] avc_alloc_node+0x2a/0x5e0 [ 1812.639458] avc_compute_av+0x2d1/0x800 [ 1812.643446] ? avc_has_perm_noaudit+0xd5/0x630 [ 1812.648039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1812.653591] ? avc_alloc_node+0x5e0/0x5e0 [ 1812.657787] ? kasan_check_read+0x11/0x20 [ 1812.661955] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1812.667286] ? rcu_softirq_qs+0x20/0x20 [ 1812.667970] audit: type=1400 audit(2000001446.500:57658): avc: denied { map } for pid=6293 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.671279] avc_has_perm_noaudit+0x3b3/0x630 [ 1812.700127] ? kasan_kmalloc+0xc7/0xe0 [ 1812.704024] ? security_msg_msg_alloc+0x4c/0xa0 [ 1812.708705] ? avc_has_extended_perms+0x15a0/0x15a0 [ 1812.713735] ? load_msg+0x42/0x320 [ 1812.717289] ? find_held_lock+0x36/0x1c0 [ 1812.721381] cred_has_capability+0x1bc/0x430 [ 1812.725816] ? selinux_ipv4_output+0x50/0x50 [ 1812.730238] ? radix_tree_insert+0x870/0x870 [ 1812.734718] selinux_capable+0x36/0x40 [ 1812.738638] security_capable+0x65/0xc0 [ 1812.742644] ns_capable_common+0xf1/0x170 [ 1812.746803] ns_capable+0x22/0x30 [ 1812.750265] ipcperms+0x255/0x3c0 [ 1812.753751] do_msgrcv+0x4d2/0x1770 [ 1812.754883] audit: type=1400 audit(2000001446.500:57659): avc: denied { map } for pid=6296 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.757386] ? copy_compat_msqid_to_user+0x950/0x950 [ 1812.786270] ? do_msgsnd+0x1780/0x1780 [ 1812.790171] ? __lock_is_held+0xb5/0x140 [ 1812.794250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1812.799795] ? check_preemption_disabled+0x48/0x280 [ 1812.804828] ? __sb_end_write+0xd9/0x110 [ 1812.808909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1812.814449] ? fput+0x130/0x1a0 [ 1812.817735] ? do_syscall_64+0x9a/0x820 [ 1812.821714] ? do_syscall_64+0x9a/0x820 [ 1812.825693] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1812.830283] ? trace_hardirqs_on+0xbd/0x310 [ 1812.834615] ? __ia32_sys_read+0xb0/0xb0 [ 1812.838685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1812.844068] __x64_sys_msgrcv+0xc5/0x150 [ 1812.847969] audit: type=1400 audit(2000001446.510:57660): avc: denied { map } for pid=6296 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.848145] ? __x64_sys_msgrcv+0xc5/0x150 [ 1812.876195] do_syscall_64+0x1b9/0x820 [ 1812.880096] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1812.885475] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1812.890410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1812.895259] ? trace_hardirqs_on_caller+0x310/0x310 [ 1812.900287] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1812.905312] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1812.910345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1812.915201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1812.917964] audit: type=1400 audit(2000001446.550:57661): avc: denied { map } for pid=6293 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.920395] RIP: 0033:0x4579b9 [ 1812.947511] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1812.966415] RSP: 002b:00007f2b3899dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 1812.974141] RAX: ffffffffffffffda RBX: 00007f2b3899dc90 RCX: 00000000004579b9 [ 1812.981444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1812.988728] RBP: 000000000073bf00 R08: a4a3ad41a879dde0 R09: 0000000000000000 03:57:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) [ 1812.996003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b3899e6d4 [ 1813.003273] R13: 00000000004c37ec R14: 00000000004d6480 R15: 0000000000000005 03:57:28 executing program 0: msgrcv(0x0, 0x0, 0x500000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1813.438339] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:57:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:28 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0xfffffffeffffffff, 0x0) readv(r0, &(0x7f0000001840)=[{&(0x7f00000003c0)}, {&(0x7f0000001680)=""/89, 0x59}, {&(0x7f0000001700)=""/201, 0xc9}, {&(0x7f0000001800)=""/45, 0x2d}], 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$xdp(0x2c, 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000480)={@loopback, 0x0}, &(0x7f00000004c0)=0x800) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r2, &(0x7f0000001640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=ANY=[@ANYBLOB="640000001c00000027bd7000fddbdf250a000000", @ANYRES32=r3, @ANYBLOB="9000800514000300d40100000180ffff4b000000080000001400010000000000000000000000ffffe00000020800090009000000080009009700000008000800", @ANYRES32=r5, @ANYBLOB='\b\x00\b\x00', @ANYRES32=r6], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0xc0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ceda11", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000180)=0x33424c32) mount$overlay(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000001880)='overlay\x00', 0x40000, &(0x7f00000018c0)={[{@redirect_dir={'redirect_dir', 0x3d, './file1'}}, {@nfs_export_on='nfs_export=on'}, {@workdir={'workdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}, {@xino_on='xino=on'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@appraise='appraise'}, {@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}, {@uid_lt={'uid<', r4}}]}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000019c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000001a80)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x24}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)={0x24, r7, 0x100, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80000001}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x881) 03:57:28 executing program 0: msgrcv(0x0, 0x0, 0x4603, 0x0, 0xa4a3ad41a879dde0) [ 1814.439518] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6c, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) 03:57:29 executing program 0: msgrcv(0x0, 0x0, 0x3f00000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1815.393209] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xa00000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:30 executing program 0: msgrcv(0x0, 0x0, 0x46030000, 0x0, 0xa4a3ad41a879dde0) 03:57:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xf0ffffff7f0000, 0x0, 0xa4a3ad41a879dde0) 03:57:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) 03:57:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, 0x6, {{0x9, 0x0, 0x16, 0x9, 0x1, 0x80, 0x2, 0x1}}}, 0x60) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1816.519426] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1816.744944] kauditd_printk_skb: 179 callbacks suppressed [ 1816.744960] audit: type=1400 audit(2000001451.410:57841): avc: denied { map } for pid=6371 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1816.892961] audit: type=1400 audit(2000001451.460:57842): avc: denied { map } for pid=6370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:31 executing program 0: msgrcv(0x0, 0x0, 0x4703, 0x0, 0xa4a3ad41a879dde0) 03:57:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000001580)={0x254, r2, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x94}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @mcast2, 0x1}}}}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x22}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffeffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeab}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x254}, 0x1, 0x0, 0x0, 0x800}, 0x8000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1817.093793] audit: type=1400 audit(2000001451.470:57843): avc: denied { map } for pid=6370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x400000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1817.287040] audit: type=1400 audit(2000001451.510:57844): avc: denied { map } for pid=6371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) [ 1817.498867] audit: type=1400 audit(2000001451.510:57845): avc: denied { map } for pid=6371 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.637865] audit: type=1400 audit(2000001451.610:57846): avc: denied { map } for pid=6380 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.729039] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1817.756129] audit: type=1400 audit(2000001451.610:57847): avc: denied { map } for pid=6380 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.848932] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:32 executing program 0: msgrcv(0x0, 0x0, 0x600, 0x0, 0xa4a3ad41a879dde0) [ 1817.907723] audit: type=1400 audit(2000001451.630:57848): avc: denied { map } for pid=6380 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x500, 0x0, 0xa4a3ad41a879dde0) 03:57:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1818.046180] audit: type=1400 audit(2000001451.660:57849): avc: denied { map } for pid=6380 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x200000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1818.198595] audit: type=1400 audit(2000001451.710:57850): avc: denied { map } for pid=6380 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c80726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "3c16eca3739e05571e005e9098aaf8a5d46c4018"}, 0x15, 0x3) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x80000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000340)={0x3e09c240, 0x0, 0x21a7}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x42b40, 0x0) 03:57:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:57:33 executing program 0: msgrcv(0x0, 0x0, 0x4, 0x0, 0xa4a3ad41a879dde0) [ 1818.940427] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xa, 0x0, 0xa4a3ad41a879dde0) 03:57:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4c00, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:34 executing program 0: msgrcv(0x0, 0x0, 0x6, 0x0, 0xa4a3ad41a879dde0) 03:57:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x4a01, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r1, r1, r1}, &(0x7f0000000080)=""/107, 0x6b, &(0x7f0000000200)={&(0x7f0000000100)={'rmd256-generic\x00'}, &(0x7f0000000000)}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303017303030302c757365725f69643dba4365d6234ad93436c1b34135a62a5ed12c85918d91d8", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1819.781919] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1819.907250] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x346, 0x0, 0xa4a3ad41a879dde0) 03:57:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) 03:57:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:35 executing program 0: msgrcv(0x0, 0x0, 0x3f00, 0x0, 0xa4a3ad41a879dde0) [ 1820.919399] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xa00000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4c, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) 03:57:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:36 executing program 0: msgrcv(0x0, 0x0, 0x5, 0x0, 0xa4a3ad41a879dde0) [ 1821.836176] kauditd_printk_skb: 157 callbacks suppressed [ 1821.836191] audit: type=1400 audit(2000001456.500:58008): avc: denied { map } for pid=6473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1821.959211] audit: type=1400 audit(2000001456.540:58009): avc: denied { map } for pid=6473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.106175] audit: type=1400 audit(2000001456.550:58010): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x900000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1822.187332] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1822.329722] audit: type=1400 audit(2000001456.550:58011): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xd00a000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1822.523088] audit: type=1400 audit(2000001456.610:58012): avc: denied { map } for pid=6473 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:37 executing program 0: msgrcv(0x0, 0x0, 0x3f000000, 0x0, 0xa4a3ad41a879dde0) [ 1822.662308] audit: type=1400 audit(2000001456.670:58013): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1822.868555] audit: type=1400 audit(2000001456.680:58014): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.044408] audit: type=1400 audit(2000001456.730:58015): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1823.223140] audit: type=1400 audit(2000001456.750:58016): avc: denied { map } for pid=6473 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1823.374172] audit: type=1400 audit(2000001456.810:58017): avc: denied { create } for pid=6474 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1823.411174] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x5000000, 0x0, 0xa4a3ad41a879dde0) [ 1823.572381] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x5000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:38 executing program 0: msgrcv(0x0, 0x0, 0x800000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:38 executing program 3: pipe2(&(0x7f00000000c0), 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x20000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_hash='dont_hash'}]}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:57:39 executing program 0: msgrcv(0x0, 0x0, 0x6000000, 0x0, 0xa4a3ad41a879dde0) [ 1824.715154] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4603, 0x0, 0xa4a3ad41a879dde0) [ 1824.868724] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xff03, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:39 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x2180, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14, 0x80000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000540)={@remote, @broadcast, r1}, 0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000600)=[@in={0x2, 0x4e22, @rand_addr=0x4}, @in6={0xa, 0x4e22, 0x9, @remote, 0x3}], 0x2c) write$FUSE_INIT(r2, &(0x7f00000003c0)={0x50, 0x0, 0x7, {0x7, 0x1c, 0x4, 0xfcc3f4b0d0998543, 0x3e000, 0x6, 0x4c, 0xc09}}, 0x50) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6664e3bd00dc49cb721cd2e81c3561335a0777f5ad2b8ce44309145e2819", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3b407e8a0384d8e14fef"]) read$FUSE(r3, &(0x7f0000002580), 0x1000) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0x5, 0x607}]}, 0xc, 0x1) write$FUSE_INIT(r3, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000580)=0x7fff, 0x2) 03:57:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:40 executing program 0: msgrcv(0x0, 0x0, 0x1000000, 0x0, 0xa4a3ad41a879dde0) 03:57:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x3f00, 0x0, 0xa4a3ad41a879dde0) 03:57:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) 03:57:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x7a00, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:41 executing program 0: msgrcv(0x0, 0x0, 0x5000000, 0x0, 0xa4a3ad41a879dde0) 03:57:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000100)=""/64) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x900, 0x0, 0xa4a3ad41a879dde0) [ 1826.789403] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1826.842709] kauditd_printk_skb: 157 callbacks suppressed [ 1826.842724] audit: type=1400 audit(2000001461.510:58175): avc: denied { create } for pid=6563 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) 03:57:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x6, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1827.040336] audit: type=1400 audit(2000001461.610:58176): avc: denied { map } for pid=6567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.129896] audit: type=1400 audit(2000001461.610:58177): avc: denied { map } for pid=6567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.272303] audit: type=1400 audit(2000001461.610:58178): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.431264] audit: type=1400 audit(2000001461.680:58179): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:42 executing program 0: msgrcv(0x0, 0x0, 0x47030000, 0x0, 0xa4a3ad41a879dde0) [ 1827.579895] Unknown ioctl -2145893009 03:57:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x347, 0x0, 0xa4a3ad41a879dde0) [ 1827.648034] audit: type=1400 audit(2000001461.740:58180): avc: denied { map } for pid=6567 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000100)={0x0, {0x7, 0xffffffff}}) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1c, 0x2, 0x20, 0xf575, 0x100000001, 0x4, 0x7fffffff}}, 0x50) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72d6c7746d6f64653d303030303030303030303030303030303030ffffffff302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB='.group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x200, 0x0, 0xc000000}}, 0x50) [ 1827.848318] audit: type=1400 audit(2000001461.780:58181): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.919899] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1828.043593] audit: type=1400 audit(2000001461.800:58182): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x300000000000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1828.288333] audit: type=1400 audit(2000001461.860:58183): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) [ 1828.458250] audit: type=1400 audit(2000001461.860:58184): avc: denied { map } for pid=6567 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:43 executing program 0: msgrcv(0x0, 0x0, 0x7ffffffff000, 0x0, 0xa4a3ad41a879dde0) 03:57:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x7ffffffff000, 0x0, 0xa4a3ad41a879dde0) [ 1829.046018] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x52200) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000001580), 0xffffffffffffff44) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x80040000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4603000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:44 executing program 0: msgrcv(0x0, 0x0, 0xf0ffffff7f0000, 0x0, 0xa4a3ad41a879dde0) 03:57:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) [ 1829.879658] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x4800, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x9, 0x0, 0xa4a3ad41a879dde0) 03:57:45 executing program 0: msgrcv(0x0, 0x0, 0x600000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) [ 1831.179779] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:45 executing program 0: msgrcv(0x0, 0x0, 0x4603000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x1000000, 0x0, 0xa4a3ad41a879dde0) 03:57:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x300, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x1) 03:57:46 executing program 0: msgrcv(0x0, 0x0, 0x8000000, 0x0, 0xa4a3ad41a879dde0) [ 1831.973419] kauditd_printk_skb: 131 callbacks suppressed [ 1831.973434] audit: type=1400 audit(2000001466.640:58316): avc: denied { map } for pid=6662 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x8, 0x0, 0xa4a3ad41a879dde0) [ 1832.080166] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1832.120856] audit: type=1400 audit(2000001466.640:58317): avc: denied { map } for pid=6662 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) 03:57:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x8, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1832.288007] audit: type=1400 audit(2000001466.680:58318): avc: denied { map } for pid=6662 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1832.438013] audit: type=1400 audit(2000001466.680:58319): avc: denied { map } for pid=6662 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1832.598033] audit: type=1400 audit(2000001466.690:58320): avc: denied { create } for pid=6663 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1832.761125] audit: type=1400 audit(2000001466.750:58321): avc: denied { write } for pid=6663 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:47 executing program 0: msgrcv(0x0, 0x0, 0x500, 0x0, 0xa4a3ad41a879dde0) [ 1832.928435] audit: type=1400 audit(2000001466.760:58322): avc: denied { map } for pid=6662 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$binfmt_elf64(r0, &(0x7f0000001580)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x8, 0x1, 0x6, 0x1, 0x3, 0x3f, 0x1, 0x260, 0x40, 0x21c, 0xfffffffffffffffe, 0x7, 0x38, 0x1, 0x9, 0x3, 0x4000000000000}, [{0x60000000, 0x7fffffff, 0x1, 0x40, 0x18, 0x8, 0x5, 0x514}], "4c7c4b5a7675be643d566dba13e6da6d024936d573be1d04a5741a8d12884fa61ad80be67798950047c480353bb4ec1ebce205b2acacde", [[], [], [], [], []]}, 0x5af) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1833.108026] audit: type=1400 audit(2000001466.800:58323): avc: denied { map } for pid=6662 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4000000, 0x0, 0xa4a3ad41a879dde0) [ 1833.218015] audit: type=1400 audit(2000001466.820:58324): avc: denied { create } for pid=6663 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1833.271234] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1833.382693] audit: type=1400 audit(2000001466.830:58325): avc: denied { map } for pid=6662 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0xf0ffffff, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) 03:57:48 executing program 0: msgrcv(0x0, 0x0, 0x8, 0x0, 0xa4a3ad41a879dde0) 03:57:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x2c, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_gettime(r1, &(0x7f0000000140)) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4703, 0x0, 0xa4a3ad41a879dde0) [ 1834.506557] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x1000000, {0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:49 executing program 0: msgrcv(0x0, 0x0, 0x347, 0x0, 0xa4a3ad41a879dde0) 03:57:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:57:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x47030000, 0x0, 0xa4a3ad41a879dde0) [ 1835.778426] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:57:50 executing program 0: msgrcv(0x0, 0x0, 0x346, 0x0, 0xa4a3ad41a879dde0) 03:57:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x4}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x1, 0x8a}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:57:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x5, 0x0, 0xa4a3ad41a879dde0) 03:57:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) 03:57:51 executing program 0: msgrcv(0x0, 0x0, 0x400000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1836.978340] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1837.011687] kauditd_printk_skb: 159 callbacks suppressed [ 1837.011700] audit: type=1400 audit(2000001471.680:58485): avc: denied { map } for pid=6750 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0xe}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1837.213765] audit: type=1400 audit(2000001471.740:58486): avc: denied { create } for pid=6748 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x500000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1837.418340] audit: type=1400 audit(2000001471.760:58487): avc: denied { map } for pid=6750 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.594642] audit: type=1400 audit(2000001471.830:58488): avc: denied { map } for pid=6750 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.763481] audit: type=1400 audit(2000001471.830:58489): avc: denied { map } for pid=6750 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:52 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x3f00, 0xa4a3ad41a879dde0) [ 1837.970561] audit: type=1400 audit(2000001471.880:58490): avc: denied { map } for pid=6750 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) 03:57:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/224) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1838.184580] audit: type=1400 audit(2000001471.880:58491): avc: denied { map } for pid=6750 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1838.366281] audit: type=1400 audit(2000001471.880:58492): avc: denied { map } for pid=6757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1838.548208] audit: type=1400 audit(2000001471.880:58493): avc: denied { map } for pid=6757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x480}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x100000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1838.671032] audit: type=1400 audit(2000001471.980:58494): avc: denied { map } for pid=6757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:53 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x5, 0xa4a3ad41a879dde0) 03:57:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) 03:57:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='gid_map\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x4e24, @rand_addr=0x3f}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0002"]) read$FUSE(r1, &(0x7f0000000580), 0xefee) socket$tipc(0x1e, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000180)) write$FUSE_OPEN(r1, &(0x7f00000000c0)={0x20, 0x0, 0x4, {0x0, 0x4}}, 0x20) 03:57:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x5}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x800000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:54 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x5000000, 0xa4a3ad41a879dde0) 03:57:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0xb}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4703000000000000, 0x0, 0xa4a3ad41a879dde0) 03:57:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:57:55 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x6000000, 0xa4a3ad41a879dde0) 03:57:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0xd}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x46030000, 0x0, 0xa4a3ad41a879dde0) [ 1842.063364] kauditd_printk_skb: 151 callbacks suppressed [ 1842.063378] audit: type=1400 audit(2000001476.730:58646): avc: denied { map } for pid=6839 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.221852] audit: type=1400 audit(2000001476.770:58647): avc: denied { map } for pid=6839 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:57 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x346, 0xa4a3ad41a879dde0) 03:57:57 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x67e}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1842.421813] audit: type=1400 audit(2000001476.840:58648): avc: denied { map } for pid=6839 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.623807] audit: type=1400 audit(2000001476.840:58649): avc: denied { map } for pid=6839 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:57:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:57:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x3f00000000000000, 0x0, 0xa4a3ad41a879dde0) [ 1842.840333] audit: type=1400 audit(2000001476.850:58650): avc: denied { create } for pid=6844 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1843.039009] audit: type=1400 audit(2000001476.860:58651): avc: denied { map } for pid=6845 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1843.166933] audit: type=1400 audit(2000001476.860:58652): avc: denied { map } for pid=6845 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x8}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1843.317547] audit: type=1400 audit(2000001476.860:58653): avc: denied { map } for pid=6845 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:57:58 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x800000000000000, 0xa4a3ad41a879dde0) [ 1843.501049] audit: type=1400 audit(2000001476.860:58654): avc: denied { map } for pid=6845 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1843.655816] audit: type=1400 audit(2000001476.880:58655): avc: denied { write } for pid=6844 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:57:58 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x8000000, 0x0, 0xa4a3ad41a879dde0) 03:57:58 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x2) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x28) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r2, 0x3ff}, &(0x7f00000001c0)=0x8) 03:57:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x9}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) 03:57:59 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x600, 0xa4a3ad41a879dde0) 03:57:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:57:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xa000000, 0x0, 0xa4a3ad41a879dde0) 03:57:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x63}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:57:59 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x500000000000000, 0xa4a3ad41a879dde0) 03:58:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000\'Nuser_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000001800)={0xfffffffffffffff7, 0x100000001, 0x6, 0x1, 0x4}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000540), &(0x7f00000017c0)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@dev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x10080, &(0x7f0000001580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, '$-{'}}, {@access_any='access=any'}, {@privport='privport'}], [{@fowner_gt={'fowner>', r2}}, {@fowner_lt={'fowner<', r3}}, {@smackfshat={'smackfshat', 0x3d, 'user_id'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '('}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsroot={'smackfsroot', 0x3d, 'i@\\/(system}ppp0wlan1.ppp0trusted'}}]}}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 03:58:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xa00, 0x0, 0xa4a3ad41a879dde0) 03:58:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x17f}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:00 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x100000000000000, 0xa4a3ad41a879dde0) [ 1846.529764] 9pnet: Insufficient options for proto=fd 03:58:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x4, 0x0, 0xa4a3ad41a879dde0) 03:58:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) write$FUSE_LK(r0, &(0x7f0000000100)={0x28, 0xffffffffffffffda, 0x3, {{0x0, 0x8, 0x2, r1}}}, 0x28) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0xa}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:01 executing program 0: msgrcv(0x0, 0x0, 0x0, 0xf0ffffff7f0000, 0xa4a3ad41a879dde0) 03:58:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) [ 1847.388582] kauditd_printk_skb: 166 callbacks suppressed [ 1847.388596] audit: type=1400 audit(2000001482.060:58822): avc: denied { map } for pid=6942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.568221] audit: type=1400 audit(2000001482.090:58823): avc: denied { map } for pid=6942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.706874] audit: type=1400 audit(2000001482.090:58824): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x9000000, 0x0, 0xa4a3ad41a879dde0) [ 1847.895671] audit: type=1400 audit(2000001482.090:58825): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x30003) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000100)=0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r3 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000fe3)="441f0801000000009727c1c6fe36cef3e26def23000200000011000013", 0x1d) getsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x26c4310c654c7d49) syz_init_net_socket$x25(0x9, 0x5, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1848.085838] audit: type=1400 audit(2000001482.170:58826): avc: denied { map } for pid=6942 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0xc}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:02 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4703, 0xa4a3ad41a879dde0) 03:58:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1848.320467] audit: type=1400 audit(2000001482.270:58827): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1848.448267] audit: type=1400 audit(2000001482.270:58828): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1848.568702] audit: type=1400 audit(2000001482.300:58829): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1848.698054] audit: type=1400 audit(2000001482.300:58830): avc: denied { map } for pid=6942 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1848.846590] audit: type=1400 audit(2000001482.350:58831): avc: denied { map } for pid=6945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x3f000000, 0x0, 0xa4a3ad41a879dde0) 03:58:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x180}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:04 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x500, 0xa4a3ad41a879dde0) 03:58:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x5, 0xa4a3ad41a879dde0) 03:58:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x1000, 0x10}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x3e76, 0xd81f, 0x4, 0x8000, 0x81, 0x7, 0x1, {r1, @in6={{0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}}, 0x200, 0xfffffffffffff801, 0x6, 0x46, 0x4078}}, &(0x7f0000000180)=0xb0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x5, 0xc2cb, 0x4, 0x1, 0xff, 0x76b, 0x21, 0x3ff, r2}, &(0x7f00000002c0)=0x20) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000003c0)={r4, 0x81, 0xe7, 0x5, 0x5, 0xfff}, 0x14) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x8004}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 03:58:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:05 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4000000, 0xa4a3ad41a879dde0) 03:58:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x900000000000000, 0xa4a3ad41a879dde0) [ 1851.107863] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x686}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:06 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x1000000, 0xa4a3ad41a879dde0) 03:58:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}}, 0x50) 03:58:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:06 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r2}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000018c0)={'syzkaller0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001ac0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8c00400}, 0xc, &(0x7f0000001a80)={&(0x7f0000001580)=ANY=[@ANYBLOB="44012000", @ANYRES16=r1, @ANYBLOB="00032abd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="280102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3800010024000100616374697665706f727400000000000000040000000000000020000000000000f3e8287dfcdd920008000300", @ANYRES32=r5, @ANYBLOB="40000100240001007072496f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r6, @ANYBLOB="3800010100000000000000f6ec7b6966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000400000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff070000028106f5adbba8895615f85834529f9c1b8f84cd900f25fff52ecf7110c623ff388948f92c40888d6611519ed37e6ea87db928e17d3f20b18ff9e3623e5686783292930ec0018d33a96c1116062bde36e9b6537faf34e919139a949fe4a52f25bad8ca81a3"], 0x144}, 0x1, 0x0, 0x0, 0x800}, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB="2c726f6fb61cc2e19807d56972a8b5439034bd746d6f64653d30303030303030303030303034303030302c750600725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cf3a5ff43b335fc7c6ce0d6afae7327b9c5a559db2170d9b5dae5270d1b5e0ce21c38c7a28939dc396279611ec3101c4e25d5337b38eb030000000000000017979dc456555cfeb809267bf7d6a0c06bb1a04a8fa86418c129"]) prctl$PR_GET_TSC(0x19, &(0x7f0000000500)) read$FUSE(r7, &(0x7f0000000580), 0xefee) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000001740)={0x0, 0xdabd, 0x1, 0x10000, [], [], [], 0x100, 0xfffffffffffffff7, 0xe8ed, 0x7fff, "4bfb763d7aa13df5711d2c2b7aa7e537"}) write$FUSE_INIT(r7, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x6}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x900, 0xa4a3ad41a879dde0) 03:58:06 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x46030000, 0xa4a3ad41a879dde0) [ 1852.405618] kauditd_printk_skb: 173 callbacks suppressed [ 1852.405633] audit: type=1400 audit(2000001487.070:59005): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.586051] audit: type=1400 audit(2000001487.070:59006): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x50) [ 1852.791842] audit: type=1400 audit(2000001487.140:59007): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.921346] audit: type=1400 audit(2000001487.220:59008): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1853.048405] audit: type=1400 audit(2000001487.260:59009): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x9, 0xa4a3ad41a879dde0) [ 1853.248016] audit: type=1400 audit(2000001487.270:59010): avc: denied { map } for pid=7030 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:07 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4703000000000000, 0xa4a3ad41a879dde0) [ 1853.448077] audit: type=1400 audit(2000001487.410:59011): avc: denied { map } for pid=7040 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1853.585657] audit: type=1400 audit(2000001487.430:59012): avc: denied { map } for pid=7040 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.690472] audit: type=1400 audit(2000001487.450:59013): avc: denied { map } for pid=7040 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.865812] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1853.895416] audit: type=1400 audit(2000001487.460:59014): avc: denied { map } for pid=7040 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x50) 03:58:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xffffff7f00000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x800000000000000, 0xa4a3ad41a879dde0) 03:58:08 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x7ffffffff000, 0xa4a3ad41a879dde0) 03:58:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67326f75705f69203d156c000a5bbdb3ebd79114c64972028ee548c35217e603381a1d70facf0d7ec5e8153207478ef6052eeb000000000000000000007fa05f267649828fdc585b0000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1855.006903] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x700000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}}, 0x50) 03:58:10 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4, 0xa4a3ad41a879dde0) 03:58:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x3f000000, 0xa4a3ad41a879dde0) 03:58:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ac6772726f75705f69640fd2015a226d90469d4658ab7206909feef4860ca406275b9c14e50d89051a657ef1b42c101061d37fb18e57660c6e09576f675570ec198bd28f40d3434a741819a99a45737699953e27668474a2f5eb4757db6f4939a0e08eb52365ed74bee591323d3bf30b8914f84f71afe700ab9a2141330628355bc8201002800d6604b0dac7ccab5f5ea4aa263ce12add801054625b052b6c3301b8dd993a63", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1855.959391] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x1000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:11 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x400000000000000, 0xa4a3ad41a879dde0) 03:58:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0xa00, 0xa4a3ad41a879dde0) 03:58:11 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}}, 0x50) 03:58:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x5000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="bd00a3430b5ffcadf293758c35c5d8d5c8f91c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c1d"]) read$FUSE(r0, &(0x7f0000001580), 0x13c3) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) chdir(&(0x7f00000013c0)='./file0\x00') r1 = accept(0xffffffffffffffff, &(0x7f0000001400)=@pppoe, &(0x7f0000001480)=0x80) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000014c0)=0xca, &(0x7f0000001500)=0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000001380)={0x8000, 0x8}) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f00000001c0)={0x7, 0x40000bff, &(0x7f00000002c0)="4cd0cc19604f66c375d644a8ad2529d40e8c106f33e91e2e1027c1218c631a7af458946db3a6e8474ef28c94c140b0d5594d140d4c74ff257c64264c0a687c09e33293d7b25c94d63b004a9f2979ca14125248eed5150ccaf677965df2f3b0bf01ad580bf0297d8f2b1d46ff6ffc91d30f47094369ba077feadbeff98db7e7ed7432829bd8c23957ed4e8e8895c2e2242b51b01559dfa2f3ab2f7ee2231c5ee44c8c45e04a00172a1324546acf96614122bc64f021164b7d2d4540018a6b16bdeee04f6ea825f24bb9c7a0f50579067e044b2236170c066bc4f04cd0bb2042e2e4720867bb10bc6f75924dcd4f676d0973ebc4a2dad0f38a534014eeaf9ec2c3b97201b5b1b9dbbd8c1f937a0e2673ff73f362d3221209b54315356b1ef6a7b9b067e829b6e2e7f59c8cac19d65523d6ed67962b27c279eaa2705f1ddb5e860880cb53a4ad3a698632206b4da7a77c62166c37ae3d314e48024b10ab72a82b596c785fb6f72c8574206664afe8c482f19244f7cd240ad217d49f94df95ad24f85883eaff2eb112e3ee341590da1b6c0b5362a7408169f57692e05a189c8e1253d313525cb07a20d6f9d465daaa442c61645af34a9024c7e4d67383f8062ef62955b2670f175ef8765aad569563e671422921e1084c42605602bc5ef7c9b814defbb11554b3c4918ec2876069422589465bfe999531e9f96c38569c180563a0afe7f8a8c5461edc43870033099ef0500873a851ec85f4fe1d9839b30a720e57513bbca2204d2466bd67445584369483dc7e893cb123d240933e31c2f616e4f90501398faea709df664a0974e8e6e99f569a0876bdafae48211c5b14974a35bfc932e38698fda4f5c31e47f3bed09c7d39e67de8939f165b959ce188f113033f774a27b2ab740c5221096134551f45837d456c9137732ed68e4814801ff957254f3ee73a599d153f3077dd7f849267a324a61b012872bd45174d903158cd5b032d0fbc65e4740eb3f2021c73f2f5980206715ef5d0c91fdee2514aa7e34c4bd4e674acbdbacb859a4da49144f3baabdc4030acc66f3356b73dbd416a8386a109d5d2a1dfe39549130d908cc06cae67a5c36b4be9cadc929b0988c702be74b4ad3fe9c317fa11783fb8e5382fb884798c5c9d5ef2ba2c53902aaeb31511a47977674f87f0f8c1df42b5268cff125e84ed6df0c6dc697f9a9432a75ef82486a9ac59c89cbe28768b6cd541b0d522bebd3533bd95b6a9aa075938d853b212b478562ea0cfa79e75870bf82248fb5e4637d92ddee052d96dedf6f491697f0fb4a64e044999113e72dcb409aeb36228c675b93cbc7695778beb5e427c8888f22dbdc00f9c06d2f954f731657db240191c504c9672078a89ee4625889296fb08a01a915b895c5e2481db02cd1666da81ffb95728481cec3f24c1fc2c2effaae181ccffb053830977e9542cb111231b15c7b3026e2fc5eb6f085c2ee9801385c79ba590fa75d25a0029d408f5b6de5c65a5e5f6d761cbcb633d72ce42754430f8719857880eb3b2a67ebee152b20e1d57362dbfd266e91c22e1ba4b7a0cc3a40575fe33d565998b22875bde1b33db689614d7b21f021a88431c75a8040ef4ba4831150f70ef5fb603cd10c5c07d2dd8e9a63755d4b7dd80ca71b61a4a29e43f1143403cdb666d8ffae34d5440fe065165f853fce90cc056c0edbafed165c34bac5e863feb1f430e931b80ae7c8a6f46598eaaf7a78d85997110b08dcd4606a3531d5cc796bd24b2fe9541682feac6eb1b4e2398d7c71b93d25357694ae29786d3d82409950f8276895563f1740aae833c4825f1a6cc55ab7b342e6b7a42437be870cbe1122a94a95f7dbb4f3005f3067b609eab02596ba2231f07b65a405ec2a9b17acb6b831f8697e9d7c073d4b937eba44dd98835d522e6fc36fc9f941c92a3f84002917345ccb16bf4c7dc07cd2f536c1ac19f204f6367b5236466e3359adc4bc1179be319159abb5c2d8e3d3dac3ec1be72accfe219e3575d3b7373923f7c621e9fa55ca7d541aab46b40d629f79d9631ae2da142d70e947880fc9ff72ad80ea5adc585cbe8cc4b598f3f813ae6096993b9fd81d5ecb99b74b986d03c82fbd2e4d9977634240ff91ca8af154264ea8bf689a57710fe1feb8c36f99869d5a0c19d27e170d85905ae086018fe44bf4c499160c50ba4f90175b3a66dfc93a0b0fa09348eac9e4fff726594e92d825c9838bd615319b41d98a6a344e2c600fca695f2f9355eb79023fe22d4cdc01adfc16208a21488705eaa58e604ee727e9bb9b8a4fd2d0b3e4c0c3a29e70ec3af315956fbae32575eb5d40e9add48f08c95caf8fc1537727a4f8c3bbe191b453f9b3fc242997867ae7d520c8a9fa2d26d361dd719468160828998a139b0ed8191ea76aa21f0068e79c9b7fcf62e78047b2e6c9cca0614c62d655e6a7294b3d7078d3eb0c0c5afdf0e0e0542f45d9d333c83171f7904a95c37d9bac9603537b4a825283327b99075f6ff95c51366d2945454a82bc7d2f012060ae26d40cc34ffeacecef4be8634a2c79947c0acd9c6db49f01dd3897d7f0919381582232f30dd42ed2f5bf1b0c21346105fb0ff33dbefd0d679f5ff531f78cbb3b3da0ed32ea8b21c4ac92dc9c050f289e37b676cb66446eeb8e56c9db196fefab30e4a5a0e9df6bbe4dea94ac982b6ba803ba6a42a513e97a225370dd9c601be33905ecae33cf608f569a4ff6ea2159d6f93f218597908e94cb98eae1d97ed466729ccfe735c0a59da6bb0a27b56826885ce9ed845091334e2b6adb3634b5a2a35abc3d2364533cf9a875d69266329941a81cfd977e871e4d900c75ca8c9f5a8ca626f839adbe07b45d59226d38b761a301704d4a9c9f3258846d3cd16384a37a94931543dfb8bf2eadad9f47333e9159f5aed3c6c2c29c3dd73a1830c008a93e5a04fec5b00c1535ab18c86fe55f5d3d3893baa006d5f3ebf14348826f63756097b58af491d54bb61707fa4cb2f76eb9f3f10086c987e52dde7f10f3a99aaf838ecdc7f6afb2493374a4632a95690006f67b4b856a23ea7b5ed1338f767d2b62de6cf8fd1acaed7d05f868b268ee49965d6d54191e3389d9de862da5e2633399c9168bfd97459c94c555ca2368df5979f4d2dbb71f2f8c4117e69ddaebaa28ea3afb6ad9bf43b6d8bdd65df0ac2002f39cf890cc3c3dafec7979d94dca1b3b6d0d89bea1fb783b1a61b9940c4574647b5540112560811fe525f1c138656140ebc69c8f1563ab469cfaa37d95b8f0201339f78a958b929f78eb4e0edbba198488012eea01474b968749e3850631a0e90d5d9fded1f9784d973d3b535e2352faf9c34bf725ea8938871e7cdc5fd1cf5cd1c1de22b439e71fde629426fb7d23a5858df0c450757674d469b6d26b10133f1b8e5c5a25bb4ec4166c1c7c53bc38ea5829297e596998f6d02a69ed54b3d7731672d19aa7fa18328cccfb2a503f242987373aa04e943008366cbb1232b50b017b404fe1f24206211afb8f30d383587a9a5e9a83c5967addca3bbc93260647423ca4a53e0ffda8cdd93c3eb3fa50b8133c0989a6c48bacbd0676c960c37f13f224ac3f1f46427a0d06b34c9b6d7b19dae708252756f6162eb690301986908be9add5a420dfb6a6f96207d5d9a24b6ba37adf772aeef8c88c47fec1e0750e436b3ca4fec6689855893683cfbe01958c3d9f2455c98c8ff12caae05fa89c1594f60c7a108683c52ce1bcf44b4e4fe48549f174d711f26cf905cd7bf1eb6a2a1e7d9b3461b7871311a44c0e81f7a263c95189208d121a31c0846f3f347c61b3196612ebd3c9752f5d74f82372fc4cc839481adbfdc62c8d45ce4984b747ed57adde1d7847c169c6896dd6a58daecbcd549e9039184691a48b39a5cf5ea9c63c835f7115aa2ffde970e62c9b7f4c09a321ba10a99da248dadb15c3c1a4e12ce8aa5e60a95d92b50815768b8ca46f5326b2adbb4b282ca68bef1ec25c7d60044cd483cfc9e3ec3686725746ad2e1af520c9762499308de0237d8fa74865c685d25e6f30737033572c98b505b1c81fba8039a068c653a0b1d0d37ffae027cbf3760a0782df458b3a1dafd652acb1880dfd5670bca90935ea3f0bc9ec5061d1073004a873e8ff7cad850c71f11b7acd9573be967eba2e630ed2b998fe3f938829435cc6bf290f5f1b828f67b1aa8282afc4ae03395ee309b40e57e493650fd2de1c250b09e90ea200039d1430ddbbb2b500fd336c0e4c9836d03b5dc79d87f8cedefc701cec933df1e06891a5b24bb265ff16db78aa83f38996d051109678d3ffe126482cf244459c610d57e2cefc052041022195ab599c36e5005be346aed7145e382dfdfb2d2a6eacad0a0a518d40f35cc77ee26a4da972b1643c92f33054214c73062ac9d7407b98e146bbe5fc60274df59a68ca1a34cf03d9af2bcf228b9ece726e4c97d599e33bddda23378b95370d50e10fb806ac71403c667692b6382899e7044660c9e8fc81287dd1b23a142c62d38f87fb13ee7576014460b30bffdbd8deeb4b7d70870b545be02cbdeda52db580ebfb14f28bef0cbf2a5811431ea834caaa8d49e566ded0e014d8deb34fb76356167fe10af11ef9196a8022b915ecc38e9867cdc5d3ab5884876c49853a5c882085909a0ead7fc264d7d0ea2ead657f6539c75c73f922e70bc8748382c59c392931242ab860c2e23f46ec9a16d95cce2f2fa9dd6cc352c042e6f160e56aa478fcc8670631becee9e652c968fb538d86ac38848c8a4b92f3a790d8123f39f7430693afb87c101b56beb51850c72958c1ac5643c66cdf4ce47a653bd03e75b2417c3da974c47c25c25aa03690a78fd21b9120aaf3944d22f3a7730394bdbb68f2100b9d86feba0c6a00dfb63778cff68ad21402f82e7b0b1e2b070638c2b670158947a19f1e3257ded446d04479d12b27bd13cb40902ca98ee301c709a9510bfeb58743968fdfa5eaaadc653abfca7fbc0bda0f7f6da8861b6b0a760af04e899b6a0d428630c4a664e172b6ffd1be7db95eefae9ff91a3fff2a2682537cde7203729e98aa6627f78acbaf3d745660d1c144231a22dcb8746ff66024985cdbea59f19b3de675a3939e1e1a748969a44990e919a50a44339f378b9c05051b5152946224e3088013d26354b82740e63f2b2d9b3385e40e087118be91841455f77a5af342019d52a3b44d305dabeaa742d3ea7f6a38d69f3328d2cc6501c3d19aeca98a738af8ad170e87203a7643f8df07dbf83ad564c76a42fda0ccb5b2a7901dec153ade2d3cfd7ee4bd56d628b45174f273d5ef8739017e35b8f78e5bd9b0ee8c08cccbc1ed116cd5e559a48d31c1eaf3030be81d7f7c50ce587c8eaf5eec3d434b93c5235dd32e976fdbcd71facc276886a57ac31d4c2902450e30a4a4ff640e9559f4912bd826ef297247d57215033cbe0fe87e114508e79f948df0c40dc437d7c4141523ebb19dca7682edae39af68e25958f3ba20fc28257a6409b3c63c7a1689a3b3a7b3f6041f5c7633b270d0b7de29815701b2faee3bc93bba068278445ebf5e4e54c0fab06f9b2b9afda2b5998a9d2f6e50b564072431ce91454bcbc0a2d6706a956e1d1f2595cdfd175f2188e20f001544300aa617f85cb58de0221e7fa7e35184d2b0f1b2c91d8cdbf051ba3268f14afc79d1f949f927049e76a2f1302d5aa3f36ed3d8e5ff8825ebbbcc7facb3b0501f10050458f8fe52489ab3fb0ea092d6d78bd6619e1eb3f77f45670f574e8bf39e68e149ae660490287ae1b", &(0x7f00000012c0)="49905652afd491552aa75d0171112509a84bdd56709f0f08be1268e13c8b40196684dc72fb3b404df3dbb33c9c001e73371cdaa071ca84081733c37c5097634ef99c86085ddaaec7a35b8317f9b59c529acdde7b3203a91bfe3022484534676d3e78ef93dc68d794d921ae843bc7778e22af6d930e11094338866d80cb734b8739511f45", 0x1000, 0x84}) 03:58:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0xa000000, 0xa4a3ad41a879dde0) 03:58:12 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x47030000, 0xa4a3ad41a879dde0) [ 1857.460023] kauditd_printk_skb: 148 callbacks suppressed [ 1857.460038] audit: type=1400 audit(2000001492.130:59163): avc: denied { map } for pid=7126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.617367] audit: type=1400 audit(2000001492.170:59164): avc: denied { map } for pid=7126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1857.751320] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1857.784856] audit: type=1400 audit(2000001492.190:59165): avc: denied { map } for pid=7126 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x68000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1857.939524] audit: type=1400 audit(2000001492.210:59166): avc: denied { map } for pid=7126 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1858.128491] audit: type=1400 audit(2000001492.270:59167): avc: denied { map } for pid=7126 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1858.337234] audit: type=1400 audit(2000001492.330:59168): avc: denied { map } for pid=7126 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x50) [ 1858.539431] audit: type=1400 audit(2000001492.350:59169): avc: denied { map } for pid=7130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x500, 0xa4a3ad41a879dde0) [ 1858.679025] audit: type=1400 audit(2000001492.350:59170): avc: denied { map } for pid=7130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:13 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x6, 0xa4a3ad41a879dde0) [ 1858.819598] audit: type=1400 audit(2000001492.350:59171): avc: denied { map } for pid=7130 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x80) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x4000000, 0x3ff, 0x1f}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="faf8d9a83aad3e4c772c674155a412a7987205000000000400000000000d0000002879e1abb4c63958dcdb3117116c4ac1f15d4ae85782032b42e19e8771563d70a9154ec3166e865c27c4f63905bbee107fcd5f162caebd9812f351c4004e54e565584f4c6d092726721f8156142532ee4f52c97e0dd5b0b6a01afdf102b809b8e0616b8770b67a381e1b20640ef108dac3db60e2c78fc85a28eee8209033e8e1b88789448b505216e6d6a2f21d1bd3f2c194323f4ef2898e2514766034cf0ad71c3cf2d9b84b9f95fc56cfd6c7c9033f0b254b65b0abec1cb1639efd5e22ba2670942b7eb441597291a233303e8cbc39957f4cb573", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x400700, 0x0) read$FUSE(r2, &(0x7f0000000580), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) ioctl$RTC_UIE_ON(r0, 0x7003) [ 1858.892388] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1858.990879] audit: type=1400 audit(2000001492.350:59172): avc: denied { map } for pid=7130 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1859.066065] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xff030000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x3f00000000000000, 0xa4a3ad41a879dde0) 03:58:14 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x8, 0xa4a3ad41a879dde0) 03:58:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x50) [ 1860.010307] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xffffff7f}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0x50e, @ipv4={[], [], @empty}, 0x7}, 0x1c) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4703000000000000, 0xa4a3ad41a879dde0) 03:58:15 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x8000000, 0xa4a3ad41a879dde0) [ 1860.995477] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7a}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x50) 03:58:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xf2b5, 0x180) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000002c0)=r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030301d303034303030302c757365725f69643dd5ba01dd51f4be916be19871fb713f027749e3bebc75566cb6ac06e1d52c8283ae9602bc4734000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='j\x00']) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4603000000000000, 0xa4a3ad41a879dde0) 03:58:16 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x3f00000000000000, 0xa4a3ad41a879dde0) [ 1862.161048] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x700}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x8000000, 0xa4a3ad41a879dde0) [ 1862.471426] kauditd_printk_skb: 182 callbacks suppressed [ 1862.471442] audit: type=1400 audit(2000001497.140:59355): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1862.628093] audit: type=1400 audit(2000001497.180:59356): avc: denied { map } for pid=7213 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:17 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x3f000000, 0xa4a3ad41a879dde0) [ 1862.798025] audit: type=1400 audit(2000001497.190:59357): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x50) [ 1863.044057] audit: type=1400 audit(2000001497.190:59358): avc: denied { map } for pid=7213 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1863.150583] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1863.194551] audit: type=1400 audit(2000001497.240:59359): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x347}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1863.378017] audit: type=1400 audit(2000001497.250:59360): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x3f00, 0xa4a3ad41a879dde0) [ 1863.516307] audit: type=1400 audit(2000001497.270:59361): avc: denied { map } for pid=7213 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1863.678986] audit: type=1400 audit(2000001497.270:59362): avc: denied { map } for pid=7213 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:18 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4603, 0xa4a3ad41a879dde0) 03:58:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1863.856261] audit: type=1400 audit(2000001497.300:59363): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000001680)=ANY=[@ANYBLOB="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"]], 0x1, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f1418d411fe0cce456837c7e24e8c58ee0900001e303030300600323030313030303030303034303030302c757365725f69e43d5da2012ff1a7534865d719fb08694e4da7d909917130dee09782d206c85b5875b8966fed62d47828a57f57bcae7e8e26d8437db8eccef7c8ded88f57c3702297c03d67d72ed9da85070ce631", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) syz_init_net_socket$ax25(0x3, 0x3, 0x0) [ 1864.086626] audit: type=1400 audit(2000001497.300:59364): avc: denied { map } for pid=7214 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1864.161877] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x1000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x50) 03:58:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x346, 0xa4a3ad41a879dde0) 03:58:19 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x347, 0xa4a3ad41a879dde0) 03:58:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1865.040642] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1865.129385] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xd00a0000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x8, 0x20003) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @empty, 0x7f}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000380)={r1, 0x80000001}, &(0x7f00000003c0)=0x8) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000100)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r3, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x8, 0xa4a3ad41a879dde0) 03:58:20 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x4603000000000000, 0xa4a3ad41a879dde0) 03:58:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, 0x50) 03:58:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1866.190283] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x10000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x400000) getsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f0000000100)=""/86, &(0x7f0000000180)=0x56) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc000000}}, 0xfffffffffffffe3e) 03:58:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x9000000, 0xa4a3ad41a879dde0) 03:58:21 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x600000000000000, 0xa4a3ad41a879dde0) 03:58:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x20000290) [ 1867.107800] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x9}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1867.515386] kauditd_printk_skb: 146 callbacks suppressed [ 1867.515400] audit: type=1400 audit(2000001502.180:59511): avc: denied { map } for pid=7310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.655807] audit: type=1400 audit(2000001502.250:59512): avc: denied { map } for pid=7310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:22 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dd60) 03:58:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4000000, 0xa4a3ad41a879dde0) [ 1867.848978] audit: type=1400 audit(2000001502.270:59513): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.881760] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1868.036107] audit: type=1400 audit(2000001502.280:59514): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x48}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1868.210909] audit: type=1400 audit(2000001502.320:59515): avc: denied { map } for pid=7310 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:23 executing program 3: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000140), r1, &(0x7f00000003c0), 0x3, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x200, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) mkdirat(r2, &(0x7f00000001c0)='./file0\x00', 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000100)) write$binfmt_elf64(r0, &(0x7f0000001580)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x1, 0x6e, 0x52, 0xfffffffffffffffa, 0x2, 0x6, 0x81, 0x1d8, 0x40, 0x2a, 0x2, 0x7, 0x38, 0x2, 0x4, 0x90, 0x1}, [{0x1, 0x1ff80000000000, 0x8, 0x9783, 0x0, 0x33d, 0x7, 0x100000001}], "23387740bd2c5c0f9ece0b0c9318", [[], [], [], []]}, 0x486) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="66643d457ef36d6c75c63803ac9b1126bdf11d9188929059ef6bcfada58ee39ef0d44acc1cadd964f1843560854cc1f9f267dd4d57c432f4bc1af917f12b5b26849c60cd819680c78af927931d1633b08c6979e5106ab5efffd482", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r4, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r4, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x810, 0x70bd2a, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) [ 1868.448007] audit: type=1400 audit(2000001502.430:59516): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0xf) [ 1868.629041] audit: type=1400 audit(2000001502.450:59517): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 0: mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x10000, &(0x7f0000000080)={[{@metacopy_off='metacopy=off'}, {@xino_on='xino=on'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'trusted/%wlan0vmnet1'}}]}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1868.808102] audit: type=1400 audit(2000001502.490:59518): avc: denied { create } for pid=7315 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1869.008009] audit: type=1400 audit(2000001502.500:59519): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x7ffffffff000, 0xa4a3ad41a879dde0) [ 1869.171731] audit: type=1400 audit(2000001502.540:59520): avc: denied { map } for pid=7310 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1869.182902] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xa00000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:24 executing program 0: r0 = msgget(0x0, 0x80) msgrcv(r0, 0x0, 0x251767e373d6dab, 0x7, 0xa4a3ad41a879dde0) 03:58:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000100)=0x2, 0x4) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0xfffffffffffffdef) 03:58:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4, 0xa4a3ad41a879dde0) [ 1870.445074] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1870.600135] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x2000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x8, 0xc8]}, &(0x7f0000000080)=0x8) msgrcv(0x0, 0x0, 0xfffffffffffffe0d, 0x0, 0xa4a3ad41a879dde0) 03:58:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x1000000, 0xa4a3ad41a879dde0) 03:58:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xca, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="7bb244b0e49a16e4d3642fb50f9c126f881c210248cb63004f212e7fb71f4945210982234e6be4a17fbbd0804fa01d91615c42ee1aaaf89682d26988b8f42c6957f8d7589ee0b079f5a2744b6ea71cd577ec8b0471dd9cc5e7ad8b629c4ea3cbf3ea8c1cf4f83f4f429e", 0x6a, 0x9}, {&(0x7f00000001c0)="6e4f49272896d1b18af2098afa2f70651802032925", 0x15, 0x26}, {&(0x7f00000002c0)="210cbab416663f52bf499d01085bb577fdd4cca3b718c631196a8c75999a3831e7be3ee8d14db7ee8e32312944f296a7b7b049c82738", 0x36, 0x7}], 0x1010, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xfffffffffffffed8) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0xfffffdef) [ 1871.610083] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x60}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:26 executing program 0: 03:58:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x47030000, 0xa4a3ad41a879dde0) [ 1872.538501] kauditd_printk_skb: 168 callbacks suppressed [ 1872.538516] audit: type=1400 audit(2000001507.210:59689): avc: denied { map } for pid=7401 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1872.652163] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:27 executing program 0: r0 = msgget(0x1, 0x2) msgrcv(r0, 0x0, 0xffffffffffffffb0, 0x0, 0x7fd) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000140}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xc2e6, 0x8000, 0x0, 0xffff}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40000) [ 1872.735795] audit: type=1400 audit(2000001507.240:59690): avc: denied { map } for pid=7406 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0xfdef) 03:58:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x600000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1872.871992] audit: type=1400 audit(2000001507.250:59691): avc: denied { map } for pid=7401 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:27 executing program 3: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x800, 0xa00) connect$netlink(r0, &(0x7f0000000100)=@unspec, 0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x1f, 0x33, 0x3}, {0x9, 0x7, 0x7, 0x9}, {0x0, 0x400000000000000}, {0x7ff, 0x8, 0xfffffffffffff800, 0x5}]}, 0x10) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1873.054951] audit: type=1400 audit(2000001507.270:59692): avc: denied { map } for pid=7401 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.189574] audit: type=1400 audit(2000001507.280:59694): avc: denied { map } for pid=7406 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.344004] audit: type=1400 audit(2000001507.280:59693): avc: denied { create } for pid=7407 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1873.508168] audit: type=1400 audit(2000001507.300:59695): avc: denied { write } for pid=7407 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0xa, 0xa4a3ad41a879dde0) [ 1873.623135] audit: type=1400 audit(2000001507.310:59696): avc: denied { map } for pid=7408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.664166] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:28 executing program 0: msgrcv(0x0, 0x0, 0x2c5, 0x0, 0xa4a3ad41a879dde0) setrlimit(0x4, &(0x7f0000000000)={0x100000001, 0x1}) [ 1873.787896] audit: type=1400 audit(2000001507.320:59697): avc: denied { map } for pid=7408 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xff03000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1873.931137] audit: type=1400 audit(2000001507.340:59698): avc: denied { map } for pid=7401 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x400) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) r4 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2000, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}], [{@fsuuid={'fsuuid', 0x3d, {[0x3e, 0x65, 0x3f, 0x31, 0x34, 0x7d, 0x61, 0x34], 0x2d, [0x37, 0x61, 0x77, 0x35], 0x2d, [0x64, 0x36, 0x35, 0x62], 0x2d, [0x77, 0x7d, 0x37, 0x64], 0x2d, [0x63, 0x38, 0x3f, 0x37, 0x3a, 0x0, 0x36, 0x34]}}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, '/dev/fuse\x00'}}, {@uid_lt={'uid<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, '&)eth0em0proc'}}, {@hash='hash'}, {@fsname={'fsname', 0x3d, '/dev/fuse\x00'}}, {@uid_gt={'uid>', r4}}, {@dont_hash='dont_hash'}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r5, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r5, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8100, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000100)=0x2, 0x4) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1874.593758] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x3000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x46030000, 0xa4a3ad41a879dde0) 03:58:29 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x42, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0xfff) 03:58:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1875.647737] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4800}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:30 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) connect$ax25(r0, &(0x7f0000000040)={{0x3, @bcast, 0x6}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 03:58:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4703, 0xa4a3ad41a879dde0) 03:58:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6772f7d201e0d1eb705f69643d046635eec3baa5d8a637300e72982f933e8274790b90fcc1f68b11b060cd62b89ccec23edd31ca12fd7310143f996ab4b0270b85752474643f83bcd3af71a4eb9b036f1cc3fa224b3a794eb5edad5b9be472b74fffad2fd17a38984ee108d7cf68268b58d7e4481a36b136ce33038641d81664e6ce4be46c4b2e8cf3e40a9b62e19f2af44c605f495b60a5d41673e35c23b6327528c81f211fd5c2984f6b80e4ca4b5f1081df42f25da5fde94995c668531b062e63839561abed77a3ae5d49", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x26000, 0x10) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) accept4$ax25(r1, 0x0, &(0x7f00000003c0), 0x80800) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x2, 0x0, 0x0, 0x0, 0x3, 0xc000000}}, 0x50) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000300)) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000400)=r3) 03:58:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002580), 0xfffffffffffffdd8) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x1, {0x5}}, 0x18) 03:58:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1876.696947] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:31 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x3) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x1, 0xffffffffffffffc0, 0xeece, 0x80000000, 0xe, 0x6, 0x10001, 0x5, 0x71b50ee6, 0x6}) 03:58:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x4603, 0xa4a3ad41a879dde0) 03:58:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xe00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x200200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e22, 0x400, @mcast1, 0x8}}}, 0x90) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000180)={0x7, 0x9}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x2}}]}}) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643da4ea8bcb713474974ebbcdf8f06d8a4f40b37f1f84fb97dfa898ed9638cd409509a990470820795721b335b479c247e45b6ab1e4c0924d2b4c85d3e604e01387a3e80b82c5dc938da09cd2a65f5ba80c430fe2337ebd34a6a64835bc8051047752b9749d17ddc2b8162f7f8ee47ca34b1a14a5c9cc02dc03e5fbe863a11e3cab19dbe9ece28d55fc7f8c0d3cc4826d96363c8bc304000000bb07025bac216d73c2d8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = dup3(r0, r0, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000100)={0x10, 0xc85, {0x57, 0x8000, 0x9bf9, {0x100, 0xffffffffffff0000}, {0x80, 0x35}, @ramp={0x100, 0xe6d9, {0xcda6, 0x100, 0x7, 0x1}}}, {0x57, 0x2, 0x401, {0xffffffffffffffff, 0x1}, {0xfffffffffffffffa}, @period={0x5f, 0x1f, 0x6, 0x12, 0x10001, {0xfffffffffffffffa, 0x1a, 0x9, 0x7}, 0x4, &(0x7f00000000c0)=[0xfffffffffffffff9, 0x5b2, 0x2, 0x47f]}}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 03:58:32 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = dup(0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x2, @remote, 0x8}, 0x1c) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r1, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x21}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfc7e}]}, 0x40}, 0x1, 0x0, 0x0, 0xc000}, 0x4004080) [ 1877.720058] kauditd_printk_skb: 178 callbacks suppressed [ 1877.720075] audit: type=1400 audit(2000001512.390:59877): avc: denied { create } for pid=7504 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1877.808788] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1877.905728] audit: type=1400 audit(2000001512.450:59878): avc: denied { write } for pid=7504 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xe}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x100000000000000, 0xa4a3ad41a879dde0) [ 1878.068004] audit: type=1400 audit(2000001512.530:59879): avc: denied { create } for pid=7504 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1878.198066] audit: type=1400 audit(2000001512.650:59880): avc: denied { map } for pid=7508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1878.335045] audit: type=1400 audit(2000001512.650:59881): avc: denied { map } for pid=7508 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1878.527985] audit: type=1400 audit(2000001512.650:59882): avc: denied { map } for pid=7508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1878.693872] audit: type=1400 audit(2000001512.650:59883): avc: denied { map } for pid=7508 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:33 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r4 = getegid() write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x3, {0x400, 0x3, 0x0, {0x4, 0x7, 0x100000000, 0x1, 0x34, 0x7, 0xffffffffffffffde, 0x9, 0x20, 0x5, 0xfe, r3, r4, 0x1, 0x100}}}, 0x78) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f00000002c0)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1878.858673] audit: type=1400 audit(2000001512.720:59884): avc: denied { map } for pid=7508 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1878.870797] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:33 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7fffffff, 0x2000) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000040)={0x1ff, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) exit(0xeacc) 03:58:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303430306be187eca8a9df7218cbf3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1879.041240] audit: type=1400 audit(2000001512.780:59885): avc: denied { map } for pid=7508 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x10}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1879.218032] audit: type=1400 audit(2000001512.780:59886): avc: denied { map } for pid=7508 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x400000000000000, 0xa4a3ad41a879dde0) 03:58:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1879.898178] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xf334) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x180, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x80000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0xf0ffffff7f0000, 0xa4a3ad41a879dde0) 03:58:35 executing program 0: msgget(0x3, 0x1) msgget$private(0x0, 0x1) msgget$private(0x0, 0x48) msgget(0x1, 0x410) r0 = msgget$private(0x0, 0xc) msgrcv(r0, 0x0, 0xfa66354da97d8fa3, 0x3, 0xa4a3ad41a879dde0) 03:58:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1880.889525] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1880.988512] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x10000, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000180)={'gre0\x00', 0x1}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="70c3a79ca80000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) connect$l2tp(r3, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x2, 0x2, {0xa, 0x4e22, 0x2c, @mcast2, 0x3}}}, 0x3a) 03:58:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7f01000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x500000000000000, 0xa4a3ad41a879dde0) 03:58:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001580), 0x1297) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:36 executing program 0: r0 = msgget(0x3, 0x80) msgrcv(r0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = getpgid(0xffffffffffffffff) tkill(r1, 0x3c) 03:58:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1881.929813] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x400000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x347, 0xa4a3ad41a879dde0) 03:58:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1882.758529] kauditd_printk_skb: 174 callbacks suppressed [ 1882.758545] audit: type=1400 audit(2000001517.420:60061): avc: denied { map } for pid=7597 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.866079] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1882.938412] audit: type=1400 audit(2000001517.430:60062): avc: denied { map } for pid=7597 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:37 executing program 0: msgrcv(0x0, 0x0, 0xfffffffffffffe71, 0x0, 0x1000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101001, 0x80) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) 03:58:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2000000) 03:58:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) mkdirat(r2, &(0x7f0000000100)='./file0\x00', 0x10) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x402, 0x5) 03:58:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x40000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1883.165076] audit: type=1400 audit(2000001517.460:60063): avc: denied { map } for pid=7600 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0xa00000000000000, 0xa4a3ad41a879dde0) [ 1883.345104] audit: type=1400 audit(2000001517.500:60064): avc: denied { create } for pid=7601 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1883.477979] audit: type=1400 audit(2000001517.500:60065): avc: denied { map } for pid=7600 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1883.608407] audit: type=1400 audit(2000001517.520:60066): avc: denied { map } for pid=7597 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1883.738975] audit: type=1400 audit(2000001517.530:60067): avc: denied { write } for pid=7601 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc1105511, &(0x7f00000005c0)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}}) fcntl$setstatus(r0, 0x4, 0x2000) [ 1883.927986] audit: type=1400 audit(2000001517.570:60068): avc: denied { map } for pid=7600 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1884.064664] audit: type=1400 audit(2000001517.570:60069): avc: denied { map } for pid=7600 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:38 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) msgrcv(0x0, 0x0, 0xb5, 0x2, 0x1000) [ 1884.174930] audit: type=1400 audit(2000001517.570:60070): avc: denied { map } for pid=7597 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1884.193425] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x9) 03:58:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6c000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x5000000, 0xa4a3ad41a879dde0) 03:58:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="66643dd6d651890727f0ee213aff203aa2b4425a24fa4e56d00dc93b0f89ecab46293a8c73ec235827", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe00000000000000) 03:58:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x400040, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x120, r2, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x477}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8424}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff4a1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffff800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4040001}, 0x40000) [ 1885.460884] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dd60) 03:58:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x900}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:40 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) sync() 03:58:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100), 0x4) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffd, 0x80) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x100000001, 0x4f5, 0xffff, 0x5, 0x10001, 0x2}}, 0x8) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1886.518220] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x9000000) 03:58:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7400000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:41 executing program 0: msgrcv(0x0, 0x0, 0xffffffffffffff7d, 0x0, 0xa4a3ad41a879dddc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$setregs(0xf, r0, 0x7ff, &(0x7f0000000040)="115bf01ee5e13bd020cc4aeeaf02da1d72427c7b01dae631c9ab61d0") epoll_create(0x2) 03:58:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) sched_setparam(r0, &(0x7f00000000c0)=0x9) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030dd6eade19dbf23113030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) write$FUSE_WRITE(r0, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x8}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c65000005ef00000000", @ANYRESDEC=0x0, @ANYRESOCT=r0]) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/member\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000140)={0x0, 0x2}, 0x2) [ 1887.541581] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x401, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) quotactl(0x5, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000002c0)="d9bc38c1f0246254618734a6251f696f33cc22f9e8520c10342b52189ca6a6818e4e1a9d32009071fa4f9b584767afbd1e89e3f08d893127187e35e0b1898b278b48d0705552d6bd9bf7b4b9e3c85e790b89bb36eac84267e86f2873287bb4f3054b79a7138d49a1e69df75d0fa36d43452391879abe423c01839706b3991f1a7a668d0ffd370ab9fc5328318fabe29b6d39aef8901cb2df29e7e6d135bd69f429812570c750b712439f5e02ebd97a028f746df2101080d5") r3 = msgget(0x0, 0x2) msgrcv(r3, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 1887.731505] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xa00) [ 1887.775619] kauditd_printk_skb: 170 callbacks suppressed [ 1887.775644] audit: type=1400 audit(2000001522.440:60241): avc: denied { map } for pid=7692 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:42 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8200, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000180)=0x5) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000004c0)=""/204, &(0x7f0000000140)=0xffffffffffffff2b) msgget(0x3, 0x14) msgrcv(0x0, 0x0, 0x1c, 0x6, 0xa4a3ad41a879dde0) 03:58:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7a00000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1887.948379] audit: type=1400 audit(2000001522.440:60242): avc: denied { map } for pid=7689 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.108384] audit: type=1400 audit(2000001522.460:60243): avc: denied { map } for pid=7689 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.307979] audit: type=1400 audit(2000001522.500:60244): avc: denied { map } for pid=7692 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.403642] audit: type=1400 audit(2000001522.540:60245): avc: denied { map } for pid=7692 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1888.528137] audit: type=1400 audit(2000001522.610:60246): avc: denied { map } for pid=7692 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.676285] audit: type=1400 audit(2000001522.610:60247): avc: denied { map } for pid=7692 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet(0x2, 0x80000, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000000c0)={'irlan0\x00', {0x2, 0x4e22, @rand_addr=0x9}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1888.811212] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1888.821361] audit: type=1400 audit(2000001522.740:60248): avc: denied { map } for pid=7700 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:43 executing program 0: r0 = msgget$private(0x0, 0x129) msgrcv(r0, &(0x7f0000000000)={0x0, ""/59}, 0x43, 0x3, 0x2000) msgrcv(0x0, 0x0, 0x326, 0x0, 0xa4a3ad41a879dde0) 03:58:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4603000000000000) 03:58:43 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') connect$llc(r2, &(0x7f0000000040)={0x1a, 0x327, 0x5, 0x100000000, 0x5, 0x401, @dev={[], 0x1d}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6c00000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1888.990956] audit: type=1400 audit(2000001522.740:60249): avc: denied { map } for pid=7700 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1889.119567] audit: type=1400 audit(2000001522.740:60250): avc: denied { map } for pid=7700 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fdJ=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x2, 0x2, {0x7, 0x1b, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1889.815425] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x300000000000000) 03:58:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x8) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:45 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x7, 0x10}, 0x98) msgget(0x3, 0x1) msgget(0x1, 0x100) r2 = msgget(0x2, 0x80) r3 = fcntl$dupfd(r1, 0x406, r1) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f00000001c0)=""/161) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) msgrcv(r2, 0x0, 0xffffffc1, 0xfffffffffffffffc, 0x1fff) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x40) accept$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10) 03:58:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x1}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) prctl$PR_SET_FPEXC(0xc, 0x100000) [ 1890.935488] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x700000000000000) 03:58:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ppp\x00', 0x101800, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000002840)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@null, @default, @bcast, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643df8b9c94388624cce3002ff0d7e5a4f0d220175a06a3cc8a09b473a251c70e3d22823c4c8faefa4b9f2c668e5c1dcaf1377f762184b0c39922b75e0eabc01900b225ebcd617aa775b29245ebee7db4332a8ffcde10d3f7f44dca23cd14a70d96d2d1cd943bd333d4efa460508a386c719da7d7e39c7c9847778f7aed86f39fcd973be295fa08b707e", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="79b8"]) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x50d802) read$FUSE(r0, &(0x7f00000028c0), 0xfffffffffffffe5c) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:46 executing program 5: socketpair$unix(0x1, 0x80000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0xc00) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}, @dev={0xfe, 0x80, [], 0x1c}, @local, 0x80000001, 0x7, 0xe0, 0x400, 0xca, 0x80000, r2}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x4, 0x4) r3 = msgget$private(0x0, 0x140) msgrcv(r3, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:46 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x181040, 0x40) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20080000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xff000000) [ 1891.842585] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x60000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getegid() getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f0000002580), 0xffffffffffffff95) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000400)="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") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'fuse\x00'}}, {@audit='audit'}, {@fowner_lt={'fowner<', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@seclabel='seclabel'}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x11}}]}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x35d, 0x3, 0xa4a3ad41a879dfdd) 03:58:47 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x40) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000540)="92d5aabef6b9a908e6ce47dfafa8df3ff3cc41aad0a4f9b8c9753aaa27c2a55c45871778ca70fae51e49ad5bdda4bbfe4f95f05c1dfc4fa91477f22a97b1bac2013d01a1cd6111f34d6d4f0906288dae3625754344026e4beb382fcb315b10c0c381f0e5d57724f2464cf7c63504091a5199a4374e0fa0a8102c02c658273dc59a0a6d5b0400179936bc6eefac7c3248e33ebc2e34a7fed20d62c05b1bb94aff3342bb4a7db3e65243ef1966366cddec000c42578ae5a8f8833f6766fd84dd") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000700)={0x80000000000005d, 0x0, [{0x1, 0x34, &(0x7f0000000440)=""/52}, {0x2, 0xc3, &(0x7f0000000600)=""/195}, {0xf000, 0x99, &(0x7f0000000480)=""/153}]}) msgrcv(0x0, 0x0, 0xffffffffffffff54, 0x0, 0xa4a3ad41a879dde0) [ 1892.805982] kauditd_printk_skb: 179 callbacks suppressed [ 1892.805996] audit: type=1400 audit(2000001527.470:60430): avc: denied { map } for pid=7798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1892.955460] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1892.998009] audit: type=1400 audit(2000001527.490:60431): avc: denied { map } for pid=7798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2c010000) 03:58:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x74}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1893.138037] audit: type=1400 audit(2000001527.510:60432): avc: denied { map } for pid=7798 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00000000b7060000fc18d1fe2d6402000000000045040400010000000704000000000000b7040000100000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f00000001c0)={0x1000, 0x800, 0x4, 0x8, 0x100000001, 0x1f}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xe, 0xc0, &(0x7f0000000080)="d9634c85d0e1accdee74fd1666c2", &(0x7f0000000300)=""/192, 0x3f00}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1893.263205] audit: type=1400 audit(2000001527.520:60433): avc: denied { map } for pid=7798 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d06517", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1fbdaa5e660b2df161cb60f41abdb649c9d5cb50cd0adc465e4c206e66870af0ddff1caa50886625545a519f32c606a6829fa2777cc49663c0abd74041ef6ece8bc88da873b389689440c9ca78b0689e6bf67a70c3cac6072ebb519e040a737f59dea5ed1876b84fbae0804f016ec3d9fc5da1753cd4d92e5aa111ab76316be371b1bb009f4f0894fcceff5a622045ef34c31eb19f856885e96c4866dd8e93c1a91b7e"]) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000003c0)=0x100000000, &(0x7f0000000400)=0x2) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0xfffffffffffffe6d, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1893.473790] audit: type=1400 audit(2000001527.590:60434): avc: denied { create } for pid=7799 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1893.697986] audit: type=1400 audit(2000001527.590:60435): avc: denied { map } for pid=7798 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x5, {0x3}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1893.851814] audit: type=1400 audit(2000001527.620:60436): avc: denied { write } for pid=7799 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:48 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x80, 0x80800) recvfrom$packet(r0, &(0x7f0000000040)=""/24, 0x18, 0x120, &(0x7f00000003c0)={0x11, 0x0, r1, 0x1, 0x80000000, 0x6, @random="1d0c81152c2d"}, 0x14) [ 1894.019541] audit: type=1400 audit(2000001527.650:60437): avc: denied { map } for pid=7798 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1894.081036] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1894.188112] audit: type=1400 audit(2000001527.660:60438): avc: denied { map } for pid=7798 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x10000000000) [ 1894.361782] audit: type=1400 audit(2000001527.710:60439): avc: denied { map } for pid=7798 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x500000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:49 executing program 3: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x400000) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x4000, 0x1}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0093b48d785834823af9bfc7a8dbf1e0965228f43a1a96fcb0a061df478c56251c6bf48652c34c44745498dd32cd5d9a3f494c4fc9d6b7a2734dc9498ff62e11"]) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:49 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x1, 0x3000) 03:58:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x800) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x109000, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r3, 0x7}, 0x8) 03:58:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xff00000000000000) 03:58:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) connect$netrom(r1, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl(r0, 0x6, &(0x7f0000000000)="4b5fba9c522637b24388f20461d9692a5a272481cae4286423225600ea99d4ec2fa04477a4e1d058a3b22710d86868e65cde4997e3b131e344103bcdf73e2ec7c9d2db224b784c307d8f819b5a19b8ba38393af1e3eaf09b0e070fa62d724748470413c1641f50aef29d29b7ad4417244445da38bc55c56af4") [ 1895.593183] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4800000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfefffffffffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ec8ee5fbeb823263f9e3bfba00000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101080, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0x9, 0x12) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x5, 0x7, 0x96d, 0x401, 0x2000000005, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x2, 0x2398b8ff4998b397, 0x7, 0x7, 'syz0\x00', 0x555}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2ccd, 0x8000) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xe00000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf401000000000000) 03:58:51 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="e6643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="862b"]) read$FUSE(r1, &(0x7f0000000580), 0xefee) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$netlink(r0, &(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f00000000c0)) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1897.343466] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:52 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x800) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000040)={0x1, 0x0, {0x1ff, 0x3, 0x7, 0x100000000}}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)='\\\x0fsystemppp1&userself\x00', 0xffffffffffffffff}, 0x30) prlimit64(r1, 0xc, &(0x7f0000000080)={0x9, 0x400}, &(0x7f00000000c0)) 03:58:52 executing program 3: chmod(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=V\'', @ANYRESOCT=0x0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x8402, 0x0) [ 1897.820626] kauditd_printk_skb: 175 callbacks suppressed [ 1897.820640] audit: type=1400 audit(2000001532.490:60615): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf401) [ 1898.039384] audit: type=1400 audit(2000001532.550:60616): avc: denied { map } for pid=7892 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.179790] audit: type=1400 audit(2000001532.600:60617): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09dc34e69a2fde3460ca3728c9abc5852b6b3a9cd5ac7c4a13ddc9ad14272f70f62a0810910786f211186de140368b1aa6bf33340426389c4bbab6fb332c3df96d51f7c916fb71f1100c6a05a130d581dee18f3e8b1d4b57ba287454ac60727f504b4334d470ee37160569f7f0ffca125eedf0649901beb0ba7c0381aad6155ec9c49e1943e516a90bd717fba4e79931f727f534a77c5ad55758a1643f65fc3fdad99725a2986b04dfd58a01ded318e500aa2268bf1c594e56fa09cf", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:52 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x44000, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1898.255871] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1898.360558] audit: type=1400 audit(2000001532.600:60618): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6c00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1898.556360] audit: type=1400 audit(2000001532.700:60619): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r2) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1898.757980] audit: type=1400 audit(2000001532.710:60620): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1898.878887] audit: type=1400 audit(2000001532.780:60621): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1899.020888] audit: type=1400 audit(2000001532.800:60622): avc: denied { map } for pid=7892 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x347) [ 1899.206401] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1899.208100] audit: type=1400 audit(2000001532.810:60623): avc: denied { create } for pid=7898 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:58:53 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) getsockname$netrom(r0, &(0x7f00000000c0)={{0x3, @null}, [@netrom, @bcast, @bcast, @netrom, @netrom, @null, @null, @bcast]}, &(0x7f0000000140)=0x48) 03:58:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1899.320735] audit: type=1400 audit(2000001532.880:60624): avc: denied { map } for pid=7899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x500}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xfffffffffffffe6f, 0x800000000000000, 0xa4a3ad41a879dddf) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x9, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x7fff}, &(0x7f0000000440)=0x8) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x54b6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2440000000000}, {0xa, 0x4e23, 0x4, @loopback, 0x2}, 0x40, [0x3ff, 0xe9a, 0x7, 0x1, 0x34, 0x9, 0x0, 0x7]}, 0x5c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000480)={r2, 0x856}, &(0x7f00000004c0)=0x8) 03:58:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x80080) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:58:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf00) 03:58:54 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x1) [ 1900.326576] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xe000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000240)={0xed, &(0x7f0000000140)="876d9f9c2b2c2b6dda7396cb82fa31051301b85f6b60cdf420419df95135a9062de4c59fbd99d7005bb11a750eccec038fb61b21ce4acd002114e4645fb2b70bd8eeb628aa4a238f3b59b110514593704573585e05b2be72fabd4a3d627e55aaf14420fb820bb4e047e60dc0a8d445d5b5d6a95ba855dd42925f59107a2f4fa367843649c0ff0a5d584e0ede083eebd5561021a1fdd287124e498e73018f974ca3d64e1f0d4df67eb9a8687e041dee17d177e1ab293fa3b0be0d98e77f8d5c4cfea9cf6c5cd324446f4508899f5bde7dd7dd5d2b84a773e450cc754a3ba8514c7c6d8d93a2492f2542680e6e10"}) getsockname$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x0, 0x1) msgsnd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x47, 0x7fb) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000340)={0x8, &(0x7f0000000300)="1fd10c8d4530bb89"}) msgrcv(r1, 0x0, 0xfffffffffffffc8b, 0x0, 0xa4a3ad41a879dde0) 03:58:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000100)) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000140)) 03:58:56 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0x800) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x480, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in6=@loopback, 0x4e21, 0x40, 0x4e24, 0x7f7, 0x2, 0x80, 0x20, 0xff, 0x0, r1}, {0x2, 0x20, 0x9, 0x1, 0x8, 0x0, 0xcba, 0x3}, {0x5, 0x3, 0x1, 0xdaa}, 0x3fb, 0x0, 0x1, 0x1, 0x3, 0x2}, {{@in6=@ipv4={[], [], @remote}, 0x4d6, 0xff}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x7, 0x1, 0xf6bd, 0x20, 0x40, 0x9}}, 0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @local}}, 0x9, 0x5, 0x10000, 0x6, 0xffffffff}, &(0x7f0000000380)=0x98) 03:58:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4b2, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 03:58:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4603) 03:58:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:56 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video2\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:58:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000100)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x84802) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:58:57 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 03:58:57 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xd2c60c4a) 03:58:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0xffffffffffffffff, {0x7, 0x1b, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbfffffe}}, 0x50) 03:58:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:58:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x17f}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1903.079999] kauditd_printk_skb: 154 callbacks suppressed [ 1903.080015] audit: type=1400 audit(2000001537.750:60779): avc: denied { map } for pid=7998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1903.248044] audit: type=1400 audit(2000001537.750:60780): avc: denied { map } for pid=7998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1903.363516] audit: type=1400 audit(2000001537.750:60781): avc: denied { map } for pid=7998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:58 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x6, 0x1d9, 0x6, 0x10000, 0x0, 0x76, 0x0, 0x4, 0xd4, 0x1, 0x82eb, 0x3, 0x9, 0x3, 0x1, 0xd8, 0x100000001, 0x2349, 0xfff, 0x5, 0xd4d, 0x3ff, 0xfffffffffffffffc, 0x9, 0x0, 0x8, 0x200, 0x7, 0x1, 0x3, 0x8, 0x6, 0x3, 0x0, 0x3, 0x7ff, 0x0, 0x10000, 0x0, @perf_config_ext={0x5f5, 0x1}, 0x0, 0x2, 0xffffffff, 0x5, 0x6, 0x1, 0x80000000}, 0x0, 0x10, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x7, &(0x7f0000000100)='md5sum\x00', r1}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) [ 1903.526775] audit: type=1400 audit(2000001537.750:60782): avc: denied { map } for pid=7998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:58 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x80fe) [ 1903.691363] audit: type=1400 audit(2000001537.800:60783): avc: denied { map } for pid=7998 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:58 executing program 5: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffc1, 0x101040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400240) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02457ae3"], 0x4, 0x3) [ 1903.810519] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x2, &(0x7f0000001580)=[{&(0x7f0000000440)="16e3d45fa5ceecdd89f37da7a6f1645b3acc73f6d2d37b0dda1c0c6edec5a7eeb4bb1e2795b68025323643c8cde965af7dce20ec6767161d5cd2c31a3ad46eec08", 0x41, 0x5}, {&(0x7f00000004c0)="4adcf5f4f779cba5c5da48fcae356162e1618986774771141ee871cedd4c2fea2d08d40a1aeea743a66dd9ac83808b534b3882f4c400d0c7acc0444b540bd9eba05ec621296b3d82eeb559396e658f93592750ed78bc50bccd37c893f2205eed3cfb8289f7e0bf8aea4a9ac7a7696107ac162a30f8eef151927124b2d79a246268f606e02f3db3e2eb2b4340c7c82b3d2c2fd845571194c3750a194fa482", 0x9e, 0x4}], 0x2000, &(0x7f00000015c0)='/dev/fuse\x00') utimensat(r0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={{0x77359400}, {r1, r2/1000+10000}}, 0x100) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x3, 0x2}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64655ffab5a957da9d9f1db13d303030303776c70056b2ec822cfc303030303030303030303030303034303030302c3d000000000000000563151db8136244bd84661b2ae4c737c9af5a4b848b2c7c21bfd26f3dc8bad41929d0ee4977726f54479ff090355d7c", @ANYRESDEC=0x0, @ANYBLOB="2c67056f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r3, &(0x7f0000000580), 0xefee) open$dir(&(0x7f00000002c0)='./file0\x00', 0x100, 0x2) write$FUSE_INIT(r3, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1903.878463] audit: type=1400 audit(2000001537.840:60784): avc: denied { map } for pid=7998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xfffffffffffff000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1904.067989] audit: type=1400 audit(2000001537.840:60785): avc: denied { map } for pid=7998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.235485] audit: type=1400 audit(2000001537.890:60786): avc: denied { map } for pid=7998 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.396364] audit: type=1400 audit(2000001537.910:60787): avc: denied { map } for pid=8002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1904.539785] audit: type=1400 audit(2000001537.910:60788): avc: denied { map } for pid=8002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:58:59 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = socket$inet_sctp(0x2, 0x800000000000004, 0x84) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) [ 1904.646296] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:58:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x5000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:58:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf5ffffff00000000) 03:58:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c723d30303030303030303030303030303030303034193030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x10000, 0x0, 0x80, &(0x7f0000ffc000/0x4000)=nil, 0x7ff}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f00000001c0)) 03:58:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x2000) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x80) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x502, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x20080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x11001) msgrcv(0x0, 0x0, 0x0, 0x0, 0x2000) 03:58:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1905.476653] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xfffff000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x600000000000000) 03:59:00 executing program 0: msgrcv(0x0, 0x0, 0x27c, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x4400) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x100000000, 0x4) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x0, 0x0, 0x1}}, 0x14) 03:59:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x9effffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRRPART(r1, 0x125f, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0x28, 0x12) 03:59:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) mlockall(0x2) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 03:59:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000200)={0xffffffff, 0x2, 0x3, 0x5, 0x16, 0xd9}) getgroups(0x6, &(0x7f00000000c0)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0x0]) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000137774,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',dont_hash,audit,rootcontext=root,pcr=00000000000000000011,smackfsfloor=ppp1securitycgroup@vmnet1,,uid=', @ANYRESDEC=r3, @ANYBLOB=',uid<', @ANYRESDEC=r3, @ANYBLOB="2c75d82b39ce039feb7507715fce69643e", @ANYRESDEC=r3, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',dont_measure,\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r4 = gettid() r5 = gettid() connect$vsock_dgram(r1, &(0x7f00000004c0)={0x28, 0x0, 0x2711, @host}, 0x10) rt_tgsigqueueinfo(r4, r5, 0x2a, &(0x7f0000000440)={0x41, 0x80000000, 0x4}) 03:59:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x600) 03:59:02 executing program 0: r0 = msgget(0x1, 0x80) msgrcv(r0, 0x0, 0x0, 0x2, 0x0) [ 1907.642601] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x5000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1f4) 03:59:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x1, {0x7, 0x8, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffc}}, 0x50) 03:59:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000100)=""/75, 0x4b) [ 1908.495972] kauditd_printk_skb: 222 callbacks suppressed [ 1908.495988] audit: type=1400 audit(2000001543.160:61011): avc: denied { map } for pid=8116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1908.637204] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1908.655400] audit: type=1400 audit(2000001543.170:61012): avc: denied { map } for pid=8116 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1908.796366] audit: type=1400 audit(2000001543.210:61013): avc: denied { map } for pid=8116 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1908.961868] audit: type=1400 audit(2000001543.210:61014): avc: denied { map } for pid=8116 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget$private(0x0, 0x400) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4400, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7fffffff) r2 = msgget(0x3, 0x100) msgrcv(r2, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1909.128756] audit: type=1400 audit(2000001543.270:61015): avc: denied { create } for pid=8118 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:59:03 executing program 0: r0 = socket$tipc(0x1e, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x37, 0x7, "7cdc677db65259a8bc7f41c11fb11311f3f33fc33e1833c102f899afb89da2efffcf17d89d74b0de8f9990d267cac8"}, 0xa0080) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000140)={0xd, @sdr={0x38414762, 0x9}}) [ 1909.284609] audit: type=1400 audit(2000001543.270:61016): avc: denied { map } for pid=8116 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xa00000000000000) [ 1909.464657] audit: type=1400 audit(2000001543.290:61017): avc: denied { write } for pid=8118 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1909.680601] audit: type=1400 audit(2000001543.320:61018): avc: denied { map } for pid=8116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_Id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) close(r0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d80bb82fe9f2e5b343240ced0845edd539e99ea13de7e63827607c8ae3836d30d8f47640d62790d1142a5ac2b80a9291f7559cfcc14acf2a876f94a87de10582e9fc6c18d3cc4735c5cecd70c6e986c679692a22b23579e48ab66443c4b7a3ed657feb7e39c2240bc230f7a003c1e669704f1c4b4e24f77be8230a32dcee6ff929b2fa0e4c3c8048077459", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1909.884719] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1909.925844] audit: type=1400 audit(2000001543.320:61019): avc: denied { map } for pid=8116 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1910.087073] audit: type=1400 audit(2000001543.370:61020): avc: denied { create } for pid=8118 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:59:04 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r2, 0x80000, r3}) msgrcv(0x0, 0x0, 0xfda4b41de5e7d65f, 0x2, 0xa4a3ad41a879dde0) 03:59:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffffff7f00000000) 03:59:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) set_tid_address(&(0x7f0000000000)) 03:59:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="66643d4f08370aaa7cc4d90abb676d05132b99938ee4566179b3fbf0af8b3cdcd6cf841afde83646d749980681d33f31600666cfbd7a8dd0645c34e7f2984b000000000000000024a7f7ca4712cc4ac3dc0886db2f5093146eac2ee4419d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:05 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000100)=0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x15f, 0x800b, 0x3, 0x5, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r1, 0x6}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000040)={0x2, 0x4, 0x1, 0x7, 0x5, 0x5b}) [ 1910.953432] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) timer_create(0x3, &(0x7f0000000140)={0x0, 0x35, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000180)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000001800)='./file0\x00', &(0x7f00000017c0)='fuse\x00', 0x1002000, &(0x7f0000001740)=ANY=[@ANYRESHEX, @ANYRES32=r0, @ANYRES32, @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES16=r0]) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x0, 0x0, 0xae4e, @empty, 'ifb0\x00'}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x5000000) 03:59:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x8000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x400, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x6a12d694}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="98000000", @ANYRES16=r2, @ANYBLOB="000026bd7000ffdbdf25110000002c0002000800080040000000080008fa9f04054c198e0800cafcffff080007003c18000008000b000a0015000800050003000000080004001600080007004e24000008000500ac14140e080007004e230000080001000300000008000629315359837f8ba6000800030004000000080005009603a1cac6720000000800040005018cae466cdbaceb92116df5b761b0036711f63caa8567f73b007540a5ff8a0afb37cbd0cebc181b0df57b0d2f97e04badee0bbc2391d176c75707a65797008e0000d538a64c5e3573bd804b0a"], 0x98}}, 0x4010) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x4, 0x5, 0x1}, &(0x7f0000000240)=0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000100)=0x9) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$setsig(r0, 0xa, 0x5) r4 = msgget(0x3, 0x90) msgrcv(r4, 0x0, 0xffffffffffffff54, 0x0, 0xa4a3ad41a879ddf0) [ 1911.912771] Unknown ioctl 1079530316 03:59:06 executing program 0: r0 = msgget(0x2, 0x20) msgrcv(r0, &(0x7f0000000000)={0x0, ""/168}, 0xb0, 0x3, 0x800) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1912.098525] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x40000100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 03:59:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4) 03:59:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x101041, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000180)={0x2, 0x3}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, @remote, @loopback, 0x7, 0xffffffffffffff06, 0x7, 0x100, 0x100, 0x20, r2}) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x6, 0x7f, 0x1, 0x1ff, 0x0, 0x8, 0x300, 0x8, 0x2, 0x4, 0xff, 0x0, 0x8ecf, 0x1ff, 0x1, 0x80, 0x7868, 0x7319, 0x1, 0x80000001, 0xfff, 0x2, 0x0, 0x6, 0x8001, 0x9, 0x100000000, 0x9, 0x9, 0x400, 0x1, 0x9, 0x10001, 0x5, 0x200, 0x9, 0x0, 0x8, 0x5, @perf_config_ext={0x9, 0x8}, 0x8, 0xffffffff, 0x5, 0x5, 0x2, 0x4, 0xfffffffffffffff7}, r3, 0xb, r1, 0x1) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'erspan0\x00', 0x600}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:07 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0xa, 0x9, 0x80000000}) r1 = semget(0x2, 0x3, 0x1) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000100)=""/69) r2 = socket$vsock_stream(0x28, 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x6, 0x4) ioctl$TCFLSH(r2, 0x540b, 0x5) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @rand_addr=0x2}, 0x4, 0x4, 0x0, 0x2}}, 0x2e) [ 1913.098706] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x4000, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4bc39ce8cc412156f699bf66643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) write$UHID_DESTROY(r2, &(0x7f0000000240), 0x4) write$FUSE_INIT(r1, &(0x7f00000002c0)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x47) 03:59:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x8004}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x80040, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000001700)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001640)={{0x5, 0x8}, 'port1\x00', 0x20, 0x10020, 0x1, 0x39, 0xffff, 0x3f, 0x40, 0x0, 0x4, 0xb8b7}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000004c0)) r2 = getuid() mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6001}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'eth\x00'}}]}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x78, 0x509000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x5, 0x0, 0x6, 0x0, 0x9, 0x200}}, 0x53a97ccaf35d3e33) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0x101000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x108, r4, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8000}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffbff}]}, @TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3be2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5db}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2f4b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x28}]}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000}, 0x4041) 03:59:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2000000000000000) [ 1913.539817] kauditd_printk_skb: 204 callbacks suppressed [ 1913.539832] audit: type=1400 audit(2000001548.210:61225): avc: denied { map } for pid=8223 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x2, 0xa4a3ad41a879dde0) sysfs$2(0x2, 0xd9, &(0x7f0000000080)=""/153) [ 1913.728011] audit: type=1400 audit(2000001548.230:61226): avc: denied { map } for pid=8229 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1913.863299] audit: type=1400 audit(2000001548.230:61227): avc: denied { map } for pid=8229 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1913.978850] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1914.004031] audit: type=1400 audit(2000001548.230:61228): avc: denied { map } for pid=8229 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:08 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x39c259b16210f88e, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[0x10000, 0x6]}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1914.191688] audit: type=1400 audit(2000001548.280:61229): avc: denied { map } for pid=8223 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1914.348016] audit: type=1400 audit(2000001548.310:61230): avc: denied { map } for pid=8223 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x20802, 0x143) getdents64(r1, &(0x7f0000000100)=""/129, 0x81) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1914.419174] QAT: Invalid ioctl [ 1914.499725] audit: type=1400 audit(2000001548.310:61231): avc: denied { map } for pid=8223 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffff1f0000000000) [ 1914.564914] QAT: Invalid ioctl [ 1914.630554] audit: type=1400 audit(2000001548.370:61232): avc: denied { map } for pid=8229 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1914.805109] audit: type=1400 audit(2000001548.440:61233): avc: denied { map } for pid=8229 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:09 executing program 0: r0 = msgget$private(0x0, 0x1) msgrcv(r0, &(0x7f0000000000)={0x0, ""/240}, 0xf8, 0x1, 0x0) msgrcv(r0, 0x0, 0xfffffffffffffed2, 0x0, 0xa4a3ad41a859dde0) [ 1914.922347] audit: type=1400 audit(2000001548.440:61234): avc: denied { map } for pid=8229 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1915.012956] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7a000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) prctl$PR_SVE_SET_VL(0x32, 0x33842) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x0, 0x800, 0xfc00000000000000}}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4000, 0x1b4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000002c0)={{0x3, 0x6, 0x0, 0x5, 'syz0\x00', 0x7fff}, 0x1, 0x0, 0x8, r2, 0x3, 0x9, 'syz0\x00', &(0x7f00000001c0)=['user_id', '/dev/fuse\x00', 'fd'], 0x13, [], [0x53d, 0x9, 0x9, 0x1800]}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xa000000) 03:59:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xf02, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x30, r2, 0x500, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008800}, 0x24000011) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0xfffffffeffffffff, 0x3}}, 0x30) 03:59:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfbe, 0x20000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x8000, 0x820a, 0x3, 0x9, 0x1, 0x1ff, 0xffffffffffff8000, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0xffffffffffffffc1, 0x8, 0x6, 0xa8, 0x100}, 0x14) [ 1916.050046] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x5}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0x68f0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:11 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde3) 03:59:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getitimer(0x2, &(0x7f0000000040)) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = msgget$private(0x0, 0x400) bind(r0, &(0x7f0000000140)=@ethernet={0x306, @remote}, 0x80) msgsnd(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="030000000000000064a6ea56a2c5d9793ff2a8bbea4fc6e6a0639afbb3e5e2b2022fba4abb95ee5a28b51d890c22b6b2a0cc9fc78096b71a09a6e8bfabea4c9e22449e693ddf498df847523fdf1a71b668b602d18c02e75d7144fa4ab9f8460876fadcfa1873670700c6aaeb6e75ddb5c3a4e1a4662db1a9c3d8e9b9ca2c50911066a3fb21f3424a7ba10ce79a9c1b1c4f8f4065a2786836d58df00a755b9f"], 0x9f, 0x800) 03:59:11 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe000000) 03:59:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xa}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x6000) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000100)=""/195, 0xc3}, &(0x7f00000002c0), 0x3}, 0x20) 03:59:12 executing program 0: msgget$private(0x0, 0x2) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x5, 0x1f}) msgget$private(0x0, 0x20) r0 = msgget(0x3, 0x1) msgrcv(r0, 0x0, 0x3e0, 0x0, 0xa4a3ad41a879dde0) 03:59:12 executing program 5: unlink(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '\xbeeth1\x00'}) 03:59:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69033d", @ANYRESDEC=0x0, @ANYBLOB="2c2d98faaa2bd6ef82c04de900"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x12c) [ 1917.961853] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x8004000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:13 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x4002) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000040)) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gfou0_idh', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) syz_extract_tcp_res(&(0x7f0000000040), 0xc2ea, 0xfff) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7, 0x10000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1918.589314] kauditd_printk_skb: 159 callbacks suppressed [ 1918.589328] audit: type=1400 audit(2000001553.260:61394): avc: denied { map } for pid=8348 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1918.761524] audit: type=1400 audit(2000001553.320:61395): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) prctl$PR_GET_NO_NEW_PRIVS(0x27) [ 1918.941850] audit: type=1400 audit(2000001553.320:61396): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xe41}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x105000, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000040)) [ 1919.113274] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1919.158990] audit: type=1400 audit(2000001553.360:61397): avc: denied { map } for pid=8344 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x10000000) [ 1919.318353] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1919.348935] audit: type=1400 audit(2000001553.380:61398): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1919.488072] audit: type=1400 audit(2000001553.410:61399): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x40000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:14 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x141000, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000040)) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1919.640096] audit: type=1400 audit(2000001553.410:61400): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1919.785040] audit: type=1400 audit(2000001553.410:61401): avc: denied { map } for pid=8348 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1919.958351] audit: type=1400 audit(2000001553.570:61402): avc: denied { map } for pid=8358 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x22) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @broadcast}, 0x8, 0x0, 0x0, 0x0, 0xa5, &(0x7f0000000040)='bcsf0\x00', 0x9, 0x6, 0x2}) [ 1920.110279] audit: type=1400 audit(2000001553.580:61403): avc: denied { map } for pid=8357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00\x88z?\x99\xa1\xda\x85W\x11\xf8\xad\x00\xe4\xc8t\x00)\xd0\xafip\xa0}\xa0\x9c\x1eW7\xfcHb\x900;\xb8\xf9\x92\x1e\x0eVn\xd9M\xb3\xe67\xacu^\xd4\xc8%N\x17\x84\xbf\xc8V\x83\xb0\x96m3(\xe0', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfc00000000000000) [ 1920.461409] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7f01}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:15 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) 03:59:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x3}, 0x4) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x1, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:15 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="0db5858288138442235a13f57af77c48db6f876d22d02441d88654629d0000008000000000d9f4530000000000000000000000513be0441eff1430fddb7f7929d6295f14c10d5fd0834b97a37232632e6112b722a8c390b0def090967a328dc88e7269e98624030fd065c02561e0d13ae7cceaa133b9824650a1b9e20ecf7e9683e064e873f2db2afa2d30a68b91f688ab7a61e7ce69df64840f6a18a401be8aeb948e7a3225ddbcf6c7698564194b1fea2f7ae25c854fdc08634b5c8e748f8a286c44a3316bb1c80000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r2, 0x81}, &(0x7f0000000180)=0x8) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x11) [ 1921.294416] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf0ffffff00000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffffff7f) 03:59:16 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xd4, 0x501000) r1 = msgget$private(0x0, 0x4) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000300)='lo\xcf.-/', &(0x7f0000000340)='*:^!\x00', &(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', &(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', &(0x7f0000000480)='wlan0$}\x00'], &(0x7f0000000580)=[&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', &(0x7f0000000540)='\x00'], 0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000005c0)={{0x8c, 0xff}, {0x8, 0x7fffffff}, 0xe5, 0x0, 0x8}) sysinfo(&(0x7f0000000080)=""/225) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000180)="736b81b8c6069bd4bfb9032013c9b5434bfbf622cdba3933cf9c0df4ff01080c534af209dda2bf8bc877bacff9db72ff950300829ff34a961fa564a30cea79f0037cdae695833fec909c298ff8c8c2fb758f2bc2b84e99ee6e0d336ce56209929efff6c122378958310dfc03e243f8963f6595ca70ea9748", &(0x7f0000000200)=""/148}, 0x18) msgrcv(r1, 0x0, 0x0, 0xffffffffffffffff, 0x800) 03:59:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fadvise64(r0, 0x27, 0xfffffffffffff000, 0x7) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',oroupJ\vT]', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x100, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x10001) [ 1922.271171] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0)='/dev/fuse\x00'}, 0x30) timer_create(0x6, &(0x7f0000000140)={0x0, 0x1a, 0x0, @tid=r1}, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4703}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:17 executing program 5: r0 = getpid() ioprio_set$pid(0x3, r0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e23, @remote}}) r4 = dup3(r2, r1, 0x80000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f0000000040)={0x2, 0x0, 0x1, 0x1800000000000, 0x6, 0x0, 0x7fff, 0x1}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x8000000000) 03:59:17 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x6, 0x7}) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5d, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x80000000, 0x10, 0x1, 0xe5b}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x3}, 0x8) [ 1923.413295] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe803000000000000) 03:59:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ustat(0x1000, &(0x7f00000001c0)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x800, 0x1, 0x10001, 0x3, 0x2}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000180)=0x8) 03:59:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x300}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x4}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400206) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1923.677482] kauditd_printk_skb: 168 callbacks suppressed [ 1923.677497] audit: type=1400 audit(2000001558.340:61572): avc: denied { map } for pid=8457 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1923.818052] audit: type=1400 audit(2000001558.400:61573): avc: denied { map } for pid=8457 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1924.065770] audit: type=1400 audit(2000001558.400:61574): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:18 executing program 0: r0 = msgget$private(0x0, 0x2) msgrcv(r0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/233) ioctl$UI_DEV_CREATE(r1, 0x5501) [ 1924.239014] audit: type=1400 audit(2000001558.400:61575): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1924.434670] audit: type=1400 audit(2000001558.470:61576): avc: denied { map } for pid=8457 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1924.599930] audit: type=1400 audit(2000001558.570:61577): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1924.606129] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x7000000) 03:59:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80, 0x40) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x7) [ 1924.763188] audit: type=1400 audit(2000001558.570:61578): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1924.931223] audit: type=1400 audit(2000001558.630:61579): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40000, 0x8) close(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1925.102560] audit: type=1400 audit(2000001558.670:61580): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0b71c6ebbed544cb1b75bcf4dc1f9c36864e2ff03f8dfbbff0db2c6b04d8fd7f3312edc95e15618bdc6818ec44c738d1a1a776ef506d0c2a8d2d4d1f34cedb502ae07c5318b6f72c567067ac989865", @ANYRESDEC=0x0, @ANYBLOB="2724000a09592f1a623773fccb90f6e8136276fe4755f0ada7e8baea2fa534b72288d0b27f04eec1529fba70b4b778b9f361973b2ed1dcb836cc17918f1317b4f72b713e9f6e6e1341512f016325c2bc0a663494f17ef3"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x80) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)={0x1, 0x3}) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x81}, 0x4) 03:59:19 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3f, 0x101200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)={0x1d8, r1, 0x401, 0x70bd26, 0x7, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa000000000}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x280000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x600000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x28}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa2f1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb746}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x867a}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000540)={'filter\x00', 0xff, "804c342d3e47b48ab34be8cdbd6bcdf5b09b9f54bbfcc1e8e10668e24c3d5374e5d3ad328a55856ad72e7a6a45387fbf55040492f18a9fbdf7764d69b5a1d6e6696185dc858e8bd09420032bedf17e6ef9579ef7052911a9c1665747705774d12dba6b65f72021f9dcb0776aca2827add9e2e65ec2499f645a10788f0280ace2085b786065587bfc0b8708fe043c12ed3d8adf8d2975103f1b63112c4ccdeaaaa10b6529a7e19b8ec4aa2ea28036b6288f832ec7fb36f4bb3ea0bb1f316e8d6ab006126020582881906c5ce6bd4e235c1632976730ceba41037440431046c1ba1b18ecca69ac35429768a0cbdfb0fab14c26ec01a5b17087d957c8651cefa9"}, &(0x7f0000000100)=0x123) io_setup(0x10001, &(0x7f0000000000)=0x0) io_getevents(r2, 0x7fffffff, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)={0x0, 0x1c9c380}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1925.308051] audit: type=1400 audit(2000001558.720:61581): avc: denied { map } for pid=8457 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget$private(0x0, 0x80) msgget$private(0x0, 0x10) r1 = msgget(0x0, 0x10) msgrcv(r1, 0x0, 0x0, 0x1, 0xa4a3ad41a879dde0) 03:59:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1000000) [ 1925.868999] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1926.028606] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:20 executing program 3: getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000180)=0x80) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000340)={@default, @null, 0x2, 0x56}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs={0x1}, 0x6e, 0x0}, 0x0) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x41) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f00000000c0)={{0xb86, 0x40}, 'port0\x00', 0x4, 0x40808, 0x8, 0x100000000, 0x1ff, 0xf15, 0x7, 0x0, 0x5, 0xd1}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$vsock_stream(0x28, 0x1, 0x0) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 03:59:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x68}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:20 executing program 0: msgget$private(0x0, 0x24) r0 = msgget$private(0x0, 0x80) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0xc98, 0x30046) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000080)) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) msgrcv(r0, 0x0, 0x3be, 0xffffffffffdffffc, 0xa4a3ad41a879dde0) 03:59:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stat\x00') bind$bt_l2cap(r1, &(0x7f0000000180)={0x1f, 0x9, {0x9, 0x4, 0x1f, 0x2, 0x7903, 0x5e}, 0x0, 0xfffffffffffffff7}, 0xe) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000100)={0x5, 0x9, 0x4, 0x8, 0x401, 0x966}) 03:59:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x404200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3ff, 0x582}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0xdf, "3dc624cf8258f263587bbfa91ae4b2f2756014f01c456a47553ab7073a6e04ccd4ee93e8a62c26a717489cde8533e2946f538dfe57035e82c7ee6b609152d341ba3a13b82726638cb5ebe4abb84f0cf3e8b177ed7a83595e33df2a2d44a14061666c7bdd78dffd1efb98eaa37f8ce8338688362a2cd8e187cab40cae7e1815fec09c35979e1153c169b3d80f26a3d526221c4e00f9077fb8f155cac5b64c067bbffb2aaed337fc752b2f080a8dff9678a82815b4fc1dfc01fea7333746ec79a68dc858809fc545ae2e0e657fddf366eb0278ba0c9dd8954fbe668ec8a78f1f"}, &(0x7f00000001c0)=0xe7) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x47030000) 03:59:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x480}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000040)={@mcast2, 0x0}, &(0x7f0000000080)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000000c0)={@multicast2, @empty, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=@ipmr_newroute={0x140, 0x18, 0x20, 0x70bd2d, 0x8804, {0x80, 0x14, 0x20, 0x6, 0xfd, 0x7, 0xfd, 0x9, 0x1500}, [@RTA_DST={0x8, 0x1, @multicast2}, @RTA_PRIORITY={0x8, 0x6, 0x800}, @RTA_MULTIPATH={0xc, 0x9, {0x1, 0x20, 0x7fff, r1}}, @RTA_METRICS={0xc4, 0x8, "9bb56f19a444dbcfde491bc39cde96c166e184bc7ff8990feaca639d3eb6c1771d107257e7a745ca0019b19786d733fd07f305ae08dc1ae2193a455c598430c9ad3386ef43a0c4a62b27b13cb4aa5d5ae6b917352d06624d5cf04f525bf77d27a0ed9c6a248d10b1a7df555daf39e3e422da69f78ba1e28de2a052fdd95a9122809300ea9d202330d00ec736d4b58e12f3e875dc4c5657d482922a19ce0b2eaae137e9bbb1da15b668b4079d42a5f5d7cd56494fdc02bb90e81edaada56722"}, @RTA_IIF={0x8, 0x1, r2}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_GATEWAY={0x8, 0x5, @loopback}, @RTA_ENCAP={0x1c, 0x16, @generic="d870d6eaee112b495c527f65340552cfbce1acde26"}, @RTA_FLOW={0x8, 0xb, 0x400}, @RTA_UID={0x8, 0x19, r3}]}, 0x140}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r4 = msgget$private(0x0, 0x1) r5 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast2, 0x4e23, 0x0, 0x4e21, 0xc8f2, 0xa, 0xa0, 0xa0, 0x3b, 0x0, r3}, {0x2, 0x2, 0x7ff, 0x6, 0xfffffffffffffffd, 0x20, 0x80, 0x6}, {0xff, 0x6, 0x4b, 0x1}, 0x1f, 0x6e6bbd, 0x1, 0x1, 0x2, 0x3}, {{@in6=@local, 0x4d5, 0xff}, 0xa, @in6=@local, 0x3504, 0x3, 0x3, 0xb748, 0x3, 0x0, 0x1}}, 0xe8) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) accept$netrom(r6, &(0x7f0000000400)={{0x3, @default}, [@rose, @null, @netrom, @bcast, @netrom, @netrom]}, &(0x7f0000000480)=0x48) msgrcv(r4, 0x0, 0x0, 0x0, 0xa4a3ad41a879dddf) 03:59:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f00000002c0)=""/67, 0x43, 0x12061, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000006060501ff0080fffdffff2e0a0000000c000100060000007d0a00010c000200000022ff02f10000"], 0x2c}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x10000, 0x0) recvfrom$x25(r3, &(0x7f0000000100)=""/81, 0x51, 0x42, &(0x7f0000000180)={0x9, @remote={[], 0x3}}, 0x12) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x3c) 03:59:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000002c0)={'gre0\x00', 0x7, 0x8}) [ 1927.934363] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) socket$inet_udp(0x2, 0x2, 0x0) 03:59:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2c01) 03:59:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x900000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1928.342002] netlink: 'syz-executor3': attribute type 1 has an invalid length. 03:59:23 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='+\x00', 0xffffffffffffffff}, 0x30) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x52d6, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x4}, &(0x7f0000000180)=0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x100000000, 0x20000) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f00000001c0)={0x4, 0x1, @raw_data=[0x3, 0x6, 0x0, 0xfffffffffffff26e, 0x3, 0x2, 0x8, 0xb9, 0xffff, 0x6, 0x23bc, 0x40, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0xa7]}) r3 = msgget(0x1, 0x300) msgrcv(r3, 0x0, 0x179, 0x0, 0x3800) [ 1928.639617] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 1928.689995] kauditd_printk_skb: 156 callbacks suppressed [ 1928.690010] audit: type=1400 audit(2000001563.360:61738): avc: denied { map } for pid=8555 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1928.885026] audit: type=1400 audit(2000001563.360:61739): avc: denied { map } for pid=8555 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) [ 1929.025469] audit: type=1400 audit(2000001563.400:61740): avc: denied { map } for pid=8560 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1929.032349] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1929.156788] audit: type=1400 audit(2000001563.460:61741): avc: denied { map } for pid=8555 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0xf, "ceda2d13a3832a86631304491ea8d6"}, &(0x7f0000000140)=0x17) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x5}, 0x8) write$FUSE_INIT(r0, &(0x7f0000000240)={0x13b, 0x2000000000, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd3}}, 0x50) 03:59:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4c00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1929.338422] audit: type=1400 audit(2000001563.470:61743): avc: denied { map } for pid=8560 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffffff8d) [ 1929.507295] audit: type=1400 audit(2000001563.510:61744): avc: denied { map } for pid=8560 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1929.688284] audit: type=1400 audit(2000001563.510:61745): avc: denied { map } for pid=8560 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1929.858586] audit: type=1400 audit(2000001563.460:61742): avc: denied { map } for pid=8555 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:24 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xcc, &(0x7f0000000080)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e24, 0x200, @remote}, @in={0x2, 0x4e21, @rand_addr=0x6}, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4133872}, @in6={0xa, 0x4e20, 0x4, @mcast2, 0x80}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x6, @local, 0xf4}, @in6={0xa, 0x4e22, 0x7, @loopback, 0x4fdcd0df}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e22, 0xffff, @local, 0x7}}, [0x1, 0x7, 0x3ff, 0x1000, 0x5, 0x7fff, 0x45ca3503, 0x36, 0x4, 0x4, 0x0, 0x6, 0x2, 0x100, 0x5]}, &(0x7f0000000300)=0x100) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x48400, 0x0) [ 1929.985353] audit: type=1400 audit(2000001563.520:61746): avc: denied { map } for pid=8555 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r1, 0x29, 0x3c, &(0x7f0000000040)=""/43, &(0x7f0000000080)=0x2b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1930.139240] audit: type=1400 audit(2000001563.590:61748): avc: denied { map } for pid=8560 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfc) 03:59:25 executing program 1: syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='loginuid\x00') mkdirat(r0, &(0x7f0000000340)='./file0\x00', 0x5b) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3c}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}]}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:25 executing program 3: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) 03:59:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:25 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x10000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xa861) 03:59:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8000, 0x400) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000040)) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x6) 03:59:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x80040000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:26 executing program 1: syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x80000000, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9, 0x26081) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x40, 0x20100) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0xfffffffefffffef9) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, 0x0, 0x0) 03:59:26 executing program 5: socketpair$unix(0x1, 0xfffffffffffdfffb, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x3, 0xa4a3ad41a879dde0) 03:59:26 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x2, 0xa4a3ad41a879dde0) r0 = msgget$private(0x0, 0x200) msgrcv(r0, &(0x7f0000000080)={0x0, ""/100}, 0x6c, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000000)={0x0, 0x81}) [ 1932.445173] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x4}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2c01000000000000) 03:59:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x48000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:27 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 03:59:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={r2, @empty, @broadcast}, 0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @ioapic={0x6004, 0x7, 0x2, 0xff, 0x0, [{0x7, 0x10000, 0x6, [], 0x80}, {0x5, 0x8, 0x9, [], 0xff}, {0x6, 0x20, 0x6, [], 0x1}, {0x9, 0x4, 0x4, [], 0x8b}, {0x1ff, 0x7, 0x8, [], 0x1}, {0x100000001, 0xfffffffffffffbff, 0x3ff, [], 0x3f}, {0xf7, 0xfffffffffffffc01, 0xbbfd, [], 0x7f}, {0x10001, 0x8000, 0x3, [], 0x8}, {0x0, 0x6, 0x409, [], 0x100}, {0x69471bbf, 0x0, 0x6, [], 0x9}, {0x4, 0x0, 0x4, [], 0x80}, {0x7, 0x393, 0x8, [], 0x1}, {0x400, 0x785, 0xd1, [], 0xaf6276a}, {0x6, 0x101, 0x1, [], 0x1}, {0x7fff, 0x6, 0x3f, [], 0x81}, {0x5702, 0x6, 0xfffffffffffffffb}, {0xb93, 0x0, 0xe51, [], 0x2}, {0x5, 0x9, 0x6, [], 0xa70}, {0x3, 0x0, 0xffff, [], 0x5}, {0x205, 0x3, 0x5, [], 0x1}, {0x0, 0x8, 0x6, [], 0xe212}, {0x39, 0x3, 0x4, [], 0x7}, {0xffffffffffffff81, 0x6, 0x1f, [], 0x64a}, {0x7, 0x5, 0xfffffffffffffffe}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x9, 0x17f) getpeername$ax25(r4, &(0x7f0000000280)={{0x3, @netrom}, [@netrom, @default, @null, @default, @netrom, @remote, @remote, @default]}, &(0x7f00000000c0)=0x48) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000040)={0xfffffffffffffff9}, 0x1) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x700) [ 1933.611321] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1933.704276] kauditd_printk_skb: 176 callbacks suppressed [ 1933.704291] audit: type=1400 audit(2000001568.370:61924): avc: denied { map } for pid=8655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1933.920006] audit: type=1400 audit(2000001568.410:61925): avc: denied { map } for pid=8658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:28 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x43000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, r1, 0x200, 0x80050bd2b, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9e5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x10) r2 = geteuid() setuid(r2) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0xfff, 0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000001c0)=0x3ff, 0x4) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x100000000}) [ 1934.076086] audit: type=1400 audit(2000001568.460:61926): avc: denied { map } for pid=8655 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}, 0x0) 03:59:28 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1934.278036] audit: type=1400 audit(2000001568.470:61927): avc: denied { map } for pid=8655 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3c1, 0x8080) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000100)={@loopback, @broadcast}, &(0x7f0000000140)=0xc) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1934.468007] audit: type=1400 audit(2000001568.490:61928): avc: denied { map } for pid=8658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1934.572264] audit: type=1400 audit(2000001568.530:61929): avc: denied { map } for pid=8655 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1934.639554] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1934.710750] audit: type=1400 audit(2000001568.530:61930): avc: denied { map } for pid=8655 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1934.798088] audit: type=1400 audit(2000001568.540:61931): avc: denied { map } for pid=8658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xa) 03:59:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xd00a}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1934.944857] audit: type=1400 audit(2000001568.540:61932): avc: denied { map } for pid=8658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1935.110568] audit: type=1400 audit(2000001568.650:61933): avc: denied { map } for pid=8658 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x9}, 0x14) 03:59:30 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x10100) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8004) 03:59:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67c22979a9c5e66147", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1935.774052] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:30 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:59:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf0ffffffffffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfec00000) 03:59:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000180)=[0xee00, 0xee01, 0xee01]) getresuid(0xfffffffffffffffe, &(0x7f00000001c0), &(0x7f0000000200)=0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x1800, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8001}}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0xa00}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_gt={'uid>', r3}}, {@audit='audit'}, {@subj_user={'subj_user', 0x3d, 'procvmnet1'}}, {@subj_role={'subj_role'}}, {@measure='measure'}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'em0GPLem0vboxnet0\\}'}}, {@dont_appraise='dont_appraise'}]}}) 03:59:31 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x3}, 0x1) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1937.041536] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x1) 03:59:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x9000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x300) 03:59:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000001c0)={0xf000000, 0xffffffffffffffff, 0xaccc, [], &(0x7f0000000140)={0x990a7c, 0x7, [], @p_u16=&(0x7f0000000100)}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x3) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x40, {"02498d9d6f59fcb9b4755c7e974ccf931828da1ba6d847ec3ab466ab25e609522e515f47f7c589a82458099f93944ae6cb6e9dea0753cfb2f1af2aa7"}}, {0x0, "e53e1d5c0613d53bd889e74fb8eba78b432061a09598b48887f1623c84b681ddd5e796e3dd8bac28ec5a86a7c069fea1707c5934ca63a1eebaaddda4745ce487c9147ea5f0ff8039b9240bbe5ba82fb6126931ec01cb56b0a0ee9dac9f0ea15d474b4f1ee26c88488108a1b01a5ec8325b00fa56f3abd3b3f81534454c"}}, &(0x7f0000000180)=""/79, 0xd3, 0x4f, 0x1}, 0x20) 03:59:32 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x20) r1 = getuid() getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78, 0xfffffffffffffffe, 0x6, {0xb739, 0x1, 0x0, {0x5, 0x8, 0x0, 0x7, 0x2, 0x101, 0xfd67, 0x7fff, 0x9, 0x3, 0x7, r1, r2, 0x100, 0x5}}}, 0x78) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200)={0x7, 0x1, 0x1e, 0x7a}, 0x14) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x28041, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x9, &(0x7f0000000240)="ba930057978d149e9c9f73b330b7dcecc49a66e588e2a7c0824facad1d396223cdc2ba5ae44553c5b4fe642a0cd596864969d5c509cb4d79dc3f7d50072e4b3685a50f2c50d3ddea08dec78689621e7dd37c844118affbab2acdd7edfa4ddd36544b2d519bf04f703c5e8c5866ffb52de76a8d105ebf745b58cdb5c5f505043320f7a716a5421b6fb229e2e7ae72995680f8439b", 0x94) [ 1938.029091] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf0}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) sysfs$2(0x2, 0x0, 0x0) 03:59:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xb00) 03:59:33 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_OPEN(r0, &(0x7f0000000100)={0x20, 0x0, 0x3, {0x0, 0x6}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="b76ec24ea1cbddfb871d44c1b953505ab6b982ff784482ef621ef9a6aa1ad43eae86f6b94f5e404ca3d1de4c95d65ddbaf1976f6e6a1a3d2c4e5ef392ee62fda0dcb1ff2c568bae452ec9d8aff88ae6215f76b137447f172c5fc6b4be090e623d3da", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x50) [ 1938.721846] kauditd_printk_skb: 206 callbacks suppressed [ 1938.721861] audit: type=1400 audit(2000001573.390:62140): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x202001, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x12000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffdffffd) signalfd4(r0, &(0x7f0000000140)={0x2}, 0x8, 0x80800) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1938.931553] audit: type=1400 audit(2000001573.410:62141): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1939.041648] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:33 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x101, 0x0, 0x10001, 0x3ff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r1, 0x9}) [ 1939.132003] audit: type=1400 audit(2000001573.450:62142): avc: denied { map } for pid=8765 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xa00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1939.268118] audit: type=1400 audit(2000001573.500:62143): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1939.395608] audit: type=1400 audit(2000001573.500:62144): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf5ffffff) [ 1939.575307] audit: type=1400 audit(2000001573.560:62145): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:34 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 1939.750477] audit: type=1400 audit(2000001573.560:62146): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0xa, &(0x7f0000000100)=[{0x3, 0x3, 0x6, 0x5}, {0x101, 0x6, 0xffff, 0x96}, {0x0, 0x1, 0xfffffffffffeffff, 0x38}, {0x8, 0xffff, 0x800}, {0x17a7, 0x4ef, 0x10000, 0x101}, {0x7, 0x5, 0x100}, {0x0, 0x0, 0x100}, {0x1, 0x4, 0x1, 0x2890}, {0x6, 0x7, 0x2, 0x4}, {0x80000001, 0x7f, 0x1, 0x400}]}) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0x40, 0x3, 0x1e7, 0x8, 0x7, 0x662, 0xd7b6, 0xc1ac, 0x2, 0x8001}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x705000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x200) [ 1939.882175] audit: type=1400 audit(2000001573.650:62147): avc: denied { create } for pid=8771 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:59:34 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) r2 = getgid() mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x80, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}]}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r3, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r3, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r4 = getpid() ptrace$setsig(0x4203, r4, 0x7fffffff, &(0x7f0000000140)={0xc, 0xd068, 0xf496}) [ 1940.034646] audit: type=1400 audit(2000001573.690:62149): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1940.112350] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1940.178814] audit: type=1400 audit(2000001573.690:62150): avc: denied { map } for pid=8765 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x8}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:35 executing program 0: r0 = getpgrp(0x0) ptrace$setopts(0x9783ae4d72ec3b99, r0, 0x1, 0x34) 03:59:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4703) 03:59:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETSF(r1, 0xc0189436, &(0x7f0000000040)={0x17, 0x81ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb800000000000000}) 03:59:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xd4, 0x7, {"8f34d07ce42850817d414020a2e0b7bb3aca056f2f543280840b7a61d73f3efe5399c8459e36551e5ed6b9cba864325ab9f906c10d83fc59f658f2f80a5ed1ea35671c09773605a4b6670e17b350901da78d31d74df2ba1e33d9c29778cfc42fceda9e8d9a57f7edb6433c671f77defd29eb7c60238f8eed18cc12df07ed03c153f91a4989178b1e09def0e61cd406f1302eddc7997838859e5e5c2eae94663810414d434720114bb3406a1e1563cd0e2081521cc3bab3f6e8318ac7"}}, {0x0, "10ed18eecfed26a5b205e2b649dbd79ea53f"}}, &(0x7f0000001580)=""/4096, 0xe8, 0x1000, 0x1}, 0x20) fallocate(r0, 0x44, 0x7, 0x8) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000002580)={0x0, {{0xa, 0x4e22, 0x6, @loopback, 0x1}}, {{0xa, 0x4e20, 0x1f, @mcast1, 0x9bd6}}}, 0x108) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000300)=0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000340)=0xb) r3 = shmget(0x2, 0x2000, 0x120, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000380)=""/37) 03:59:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/245, 0xf5) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1941.138338] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:36 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x79, @local, 0x4}, @in6={0xa, 0x4e23, 0x9, @empty, 0x800}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x68) sendto$unix(r0, &(0x7f00000002c0)="f30110c032eb3e143a83f2e5f6b439c0d098979bfe857220fc59cfedb10d8053f4d59618040000005b6ab7ec7aeda8c57a07b04c163e6bfe627b159f24c84f00d9b6afe78a6b4f9ea635564b719d681b03aa28deac9b2eeacfabdc5763a16af61469edc89f1daadb3428af137a838b02aca1dfdecaea9921bf6c081c8b6ed2230ba38fac8b324eb27125246714d658b5a6d5941ddd7b1e9a5282a95edaf37735ccd9a1756fac41456e89a4f14f312986f5b9c76e", 0xbb, 0x24008010, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0xfffffffffffffdaa) r1 = msgget(0x1, 0x10) msgrcv(r1, 0x0, 0x0, 0x0, 0x2000) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000000c0)={r3, 0xb8, 0x28, "a1ea84a2e7e88cf50790e74a642b10b077db16e9b9109279532ac326159d5b0bbe4fdfd1082be879"}, 0x30) 03:59:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4000) [ 1941.863796] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:59:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd4(r0, &(0x7f0000000000)={0x3ff}, 0x8, 0x800) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf0ffffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="000100", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00002000000000000040000,user_id=', @ANYBLOB="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", @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write(r0, &(0x7f00000000c0)="ecf923d22f638e4b2654a24ede77dcf8da93354890a778e40ce0e02da86481d259af106841ed12d17866e0da5ff8edd69fe59a3de941e185", 0x38) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101900) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) [ 1942.800131] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfffffff5) 03:59:37 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x35c, 0x200, 0x1, 0x80000001}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:37 executing program 0: r0 = msgget$private(0x0, 0x100) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x8401) accept$netrom(r1, &(0x7f0000000040)={{}, [@netrom, @bcast, @null, @netrom, @bcast, @rose, @remote, @bcast]}, &(0x7f00000000c0)=0x48) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000022308f396e4a23eaf3e01fff24d5c81a760745709027abc843bb5ea802e50f4d184a16ac189a20029ae58e00be447d1aeb16468f5779f6b4d761670ba4584e108e681f3b013ea19e5aef6b7cbee29c4d5130470100000000000000cf2a5e5550dd817f9aad313c0fde7544517fc944446cfdafaba787d84434301ae4d355335761a8138f5e42765867915993e67eff43f1f5cdc7a5fd426d99ffd494675b6353d2d5f81a129474819d0a8b806d1a5a7e741eff761a2c29a6d99bbe7fd6ea2429d209591f3c0bc4fcada04d749e08384ffaa4dddb491c1545ebc712a5d89b90532bbf6974be740a2fea2648fed9"], 0x8e, 0x800) msgrcv(0x0, 0x0, 0x0, 0x1, 0x3000) 03:59:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4c000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:37 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000001c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x3a5) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) dup2(r0, r1) [ 1943.731532] kauditd_printk_skb: 160 callbacks suppressed [ 1943.731547] audit: type=1400 audit(2000001578.400:62310): avc: denied { map } for pid=8866 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3c02"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x8dffffff00000000) [ 1943.890896] audit: type=1400 audit(2000001578.420:62312): avc: denied { map } for pid=8866 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1943.900045] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1944.032407] audit: type=1400 audit(2000001578.400:62311): avc: denied { map } for pid=8865 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7a00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1944.177337] audit: type=1400 audit(2000001578.450:62313): avc: denied { map } for pid=8866 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x1, 0x80) msgrcv(r1, 0x0, 0x0, 0x100000000, 0xa4a3ad41a879dde0) [ 1944.372321] audit: type=1400 audit(2000001578.480:62314): avc: denied { map } for pid=8866 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x240000000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:59:39 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1944.535666] audit: type=1400 audit(2000001578.510:62315): avc: denied { map } for pid=8865 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1944.717043] audit: type=1400 audit(2000001578.530:62316): avc: denied { create } for pid=8869 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1944.865555] audit: type=1400 audit(2000001578.530:62317): avc: denied { map } for pid=8866 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1945.041966] audit: type=1400 audit(2000001578.540:62318): avc: denied { map } for pid=8866 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000000c0)={0x3, 0x30a}) 03:59:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x6006000000000000) [ 1945.198779] audit: type=1400 audit(2000001578.550:62319): avc: denied { map } for pid=8865 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1945.418538] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x9) r3 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x1220daf9, 0x0, 0x9, 0x7, 0x0, 0x81, 0x7, 0x7b}, &(0x7f00000000c0)={0x0, 0x9, 0x4c90, 0x2, 0x100000000, 0x7, 0x0, 0x49}, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000180)={&(0x7f0000000140)={0x80}, 0x8}) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000480)={0xffffffffffff0001, 0x3, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) clock_nanosleep(0x5, 0x0, &(0x7f00000005c0), &(0x7f0000000580)) fstatfs(r2, &(0x7f0000004200)=""/4096) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x2e828903, &(0x7f00000003c0)="e8ddef7c212983bf4e7372ad4e9eccaed37965222e9e7e7b55855b57ba4a56fca98359a2a2b3bde5285677b1a93d4b24a53deaa47671af344ebc4f09ad0a4e45d7e7d2254d855597a357a8ddf8a397dde184acdee811611497c58c193eaa58980a11cd1b56c2ec505e1cc82742833fea7fcf4f028b707bfba420634dd9cfe0689fdac28ae8a205a941b9633b94c6ddc8c5d01cce99f780a7efa9b12d77425498c324a8d7ca3f19e9ecc36ac6", 0x0, 0x0, 0x0) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000a40)=""/169) syslog(0x0, &(0x7f0000000340)=""/89, 0x59) 03:59:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x50}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xa84de8b390e38ebf, &(0x7f0000000180)="0a4e702dc4209d086d73ed62a99041510f497db6b5c1778c66ec36f8bf948eb8ab08163d89018884dbf8e06a2c3bcb8226b55c891226deedaa6e9c9571f8e29776d2e87de131c34b6775f06e2af72ce52fe36215b3fa8070a1435ba680768de337c9a7769ad54f559658051360ca82b03d3974b404ea58eb42ceced1e30c9fac60733d976bfd00fa6c7c8d3e4545f1d6a7eec29defa218f32d148c1190ec7ea21c3cf1e848a0aa73accb5de5ac27944a79ee8bb56a5275d0be32f6d5e1ae875c27cf", 0xc2) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000100)=0x5, 0x4) 03:59:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)="003e7bbb044fa408fbbd824d1be13659165a1bb3c9a0711e39dd2f4e8f993f2b893d154b8e4a492fca59642b23177477524ff755d9be8c24cce036be8934a2c01e5134b45dfeb3490010597d35", 0x4d, 0x6}], 0x30000, 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a644a00ef677fd14fd5de30bc7c6d34f1936a32a"]) r3 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5, 0x81}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000400)=""/59) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vsock\x00', 0x30b084, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000380)={0x4, 0x3, 0x2, 0x5, 0x2, 0x4}) fstat(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r5, &(0x7f0000000440)={0x78, 0x0, 0x7, {0x80000000, 0x8, 0x0, {0x5, 0x6f, 0xd678, 0xd6bf, 0x6, 0x3, 0x80000001, 0x7ff, 0xfff, 0x7d, 0x100, 0x0, r6}}}, 0x78) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x40000001001) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r7, &(0x7f0000e33fe0)='s', 0x1, 0x815, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) 03:59:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x402000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000100)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3f000000) [ 1946.286277] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4703000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3f, 0xc0000) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, '*:'}}, 0x23) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1946.824885] overlayfs: failed to resolve './file1': -2 03:59:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffff1f00) 03:59:42 executing program 3: 03:59:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x74000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="ef643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001580), 0x128a) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x1, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:59:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 03:59:42 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e23, @loopback}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x5, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'teql0\x00'}) 03:59:42 executing program 3: 03:59:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3000000) [ 1948.378654] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xff03}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1948.745135] kauditd_printk_skb: 158 callbacks suppressed [ 1948.745174] audit: type=1400 audit(2000001583.410:62478): avc: denied { map } for pid=8955 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x101040, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000001c0)={@rand_addr, @loopback, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @empty, 0x0}, &(0x7f00000002c0)=0xc) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000300)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)=""/179, 0xb3}, {&(0x7f0000000440)=""/11, 0xb}], 0x2}, 0x3}], 0x1, 0x1, &(0x7f0000000500)) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000700)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x804}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="00001400", @ANYRES16, @ANYBLOB="000129bd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r4, @ANYBLOB="e800020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004008100000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400000200003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5], 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = syz_open_pts(0xffffffffffffffff, 0x801) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f0000000000)=0x5) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r7 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xfff, 0x22001) ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000080)={0x6b, ""/107}) 03:59:43 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001200)='/selinux/checkreqprot\x00', 0x101002, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1948.935760] audit: type=1400 audit(2000001583.430:62479): avc: denied { map } for pid=8955 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:43 executing program 3: 03:59:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xfffffffffffffffc) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1949.113042] audit: type=1400 audit(2000001583.430:62480): avc: denied { map } for pid=8955 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.263918] audit: type=1400 audit(2000001583.530:62481): avc: denied { map } for pid=8955 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfc00) [ 1949.446945] audit: type=1400 audit(2000001583.530:62482): avc: denied { map } for pid=8955 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.521327] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1949.579076] audit: type=1400 audit(2000001583.600:62483): avc: denied { map } for pid=8967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6c}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:44 executing program 3: 03:59:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) [ 1949.737379] audit: type=1400 audit(2000001583.640:62484): avc: denied { map } for pid=8967 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1949.928898] audit: type=1400 audit(2000001583.670:62485): avc: denied { map } for pid=8967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1950.097977] audit: type=1400 audit(2000001583.670:62486): avc: denied { map } for pid=8967 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) epoll_create(0x5c5) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1950.268045] audit: type=1400 audit(2000001583.780:62487): avc: denied { map } for pid=8967 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:45 executing program 3: 03:59:45 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000140)={0xffffffff, 0x7, 0xd84, 0x2, 0x8}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000240)={r0, 0x0, 0x3f800, 0x5, 0x3}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101300, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000400)={0x3c35f228, 0x0, [], {0x0, @reserved}}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x1f, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000300)={r3, 0x9}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000001c0)={[], 0x5, 0x2, 0x9, 0x100000001, 0x200, r2}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000280)={0x57, 0x2, 0x2f3, {0x7, 0x2}, {0x6ae1fbae, 0x2247}, @rumble={0x4, 0xd2}}) [ 1950.668225] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = gettid() r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000040)={0x8}, 0x1) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x20, 0x3, 0xfffffffffffffffc, 0x80, 0x0, 0x1, 0x4010, 0xd, 0x1000, 0x80, 0x1, 0xfffffffffffffeff, 0x8, 0x4, 0x7, 0x80, 0x80000000, 0x8000000000000000, 0x46f, 0xfffffffffffffff7, 0x7, 0x3, 0x1, 0x800, 0x80000001, 0x3, 0x0, 0x81, 0x4, 0x401, 0x3, 0x3c2, 0x3, 0x1, 0x3ff, 0x1f8000000000000, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x6}, 0x1000, 0x5, 0x63, 0x0, 0x7, 0x2, 0xad4c}, r1, 0x3, r2, 0x1) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000080)="591c4eb2febc7639b8387091a41652915128551c2ff14b6179a3390ddb64b54a6c3d79f82dd0e26ec064b50bf775425ad42577f3c7fc4c152d9f0d3a5e11f3fb1c047988195c326a97424f04a2dbbfe974bcc228c208a2a612065f00a6d3ebe3f743f840f937ce046da95e4aa4746638d90b7e28c7f356a186a6cea004b2bc063b7b63d59c692b3484b0985714fb5abed317fe") ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 03:59:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfec0) 03:59:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6800000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:46 executing program 3: 03:59:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0x1318) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1951.629416] QAT: Invalid ioctl [ 1951.659701] QAT: Invalid ioctl 03:59:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x2) [ 1951.773482] QAT: Invalid ioctl [ 1951.793344] QAT: Invalid ioctl [ 1951.832372] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget(0x3, 0x412) r1 = msgget(0x0, 0xa0) msgrcv(r1, 0x0, 0x0, 0x1, 0xa4a3ad41a879dde3) 03:59:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x800000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:46 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}}, 0x5c) 03:59:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0x0) 03:59:47 executing program 0: r0 = msgget$private(0x0, 0x82bb63e9bfeffbd0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='cpuset&posix_acl_access%\x00', 0x19, 0x0) [ 1952.690772] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x7, &(0x7f0000000400)=[{&(0x7f0000000080)="4fd9978200856a390611d8c8e5ea11564e5737c97d2350b57ed803d494968f50872002d6f8f8315e99605e1d9909ef6fa9b4c594357687f9a590be8b2dc98768dee8858bf4a04ae1395173db608d253c9219a236aada436c8c5aa50ebfed00496e4f8648e635d301d186ad48a9ebddf8851f544e5760dd7fb8aeff1e454da6147a3b370c2968d0a4b45c7cc38feca109ada627a8b9198b61d09fe9c6d08c4ab8d26f92b3c7b089403a818ed44d05cc3e57208eacc3a5ac8c7ccb11", 0xbb, 0x81}, {&(0x7f0000000140)="a76c158fa771ae53887bec08aa16a0d9af79ebb71749ad4bfb674ec62f5863a0d20949f1c985917fdacda185fba581b9ca785aca0004a6a1577728b632f16a5013716511df03ca88eb030ffee2a9bf192a738a252e3d1d3103114c4f7b40f6eaa91d0496402f517dcc9868a809121a6cfc5a8e7cfeb400b471c33a4e648990d2cc87", 0x82, 0xffffffffffffff80}, {&(0x7f0000000200)="46287878501755cb68d8e041bcc5901bfab85db9aafba3d202237543703f93b28bdf927382ce8cda", 0x28, 0x1}, {&(0x7f0000000240)="7c90794790773f1372213f62408d51f92402c3e0d3b52fe238a3d3fae127c3dc1499ddf1004552ba020f9b6696cde22c94d170f67de2531cd71477ac51ea52344a0b00a94f8590a155", 0x49, 0x40}, {&(0x7f00000002c0)="6ad6e93e4fc7b437540165ab31cde20bf595136430cc8e4e", 0x18, 0x80000001}, {&(0x7f0000000300)="c4b26d999b900118f717f9384cb79d3cf4e2b06f03258aab1cb8e68aee1deacb1d09b4ea77a493c3cf1096a9c3e1d6c73cd71e56f68fd63e51d1c56c437bcfdeb388147931747f7a4f8629661e8899d5569b15aa35615e691b0b832df40517424ba554a6432baf04d9b89909e6f102deab79febb515bdc40a1c62ccd1bde723181dbddfab021aa06f80ad9008f1bd28eb58a6cb32d253be9e742cc5f8bf230560d7c06fe39b902e0cb900a14b9d80d874ed57400111b89", 0xb7, 0x8a2}, {&(0x7f00000003c0)="9cdb88be465db4aa2684ce2c9ae458b8dcb3b654", 0x14, 0x100000001}], 0x880c04, &(0x7f0000000540)={[{@nouser_xattr='nouser_xattr'}, {@noattrs='noattrs'}, {@balloc_border='block-allocator=border'}, {@barrier_none='barrier=none'}, {@notail='notail'}, {@data_journal='data=journal'}, {@noquota='noquota'}, {@tails_on='tails=on'}], [{@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'em0mime_typevmnet0eth0,\'-'}}, {@appraise='appraise'}, {@euid_eq={'euid', 0x3d, r2}}]}) msgget$private(0x0, 0x180) r3 = msgget(0x0, 0x400) msgrcv(r3, 0x0, 0x2aa, 0x0, 0xa4a3ad41a879dde0) 03:59:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x9effffff00000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x100000000000000) 03:59:47 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) pipe(0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) sysfs$2(0x2, 0x20019, 0x0) [ 1953.429547] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4c}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1953.756275] kauditd_printk_skb: 163 callbacks suppressed [ 1953.756290] audit: type=1400 audit(2000001588.420:62651): avc: denied { map } for pid=9050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xffffffffffffff73, 0x0, 0x2000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 1953.925697] audit: type=1400 audit(2000001588.470:62652): avc: denied { map } for pid=9050 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfe800000) [ 1954.087486] audit: type=1400 audit(2000001588.470:62653): avc: denied { map } for pid=9050 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r1, 0x800, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x2, 0x81, 0x2}}}, [""]}, 0x30}}, 0x4000004) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setpgid(0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc681008a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f4843830000000000000000635abea9833df32f75d92d392390b4fef75c9923a1745b53c38ac98529f9d0905cccb399fe9b23d114721591b63910313f828bc2db4e018d1de905efa0000000000000000", 0xcb, 0x8801, 0x0, 0x0) 03:59:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000480)={0xa0, 0x19, 0x1, {0x6, {0x20, 0x4, 0x5}, 0x80, r2, r3, 0x1, 0x3, 0x400, 0x7, 0xfffffffffffffffa, 0xffffffffffffffe1, 0x4b, 0x5, 0x9, 0x4, 0x70, 0x7fff, 0x2, 0x0, 0x6}}, 0xa0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000001580)="601b054a21e1836a149487c9ff21086e175d9ae19d5a645b3a6b43fc56432075b9f6f98be878f8d2bfe44843631027bb0245afa7753f2eb66cfbbd8567b2ca94fc82068afab5c26ca69ac5078ad743a03cbae18e2c777225814e54e254e8f12ece998404562d299f7493bfb63cd5caa25afa9134f5a68d6da60af74d32875c7d745263f2f95ac3bd025612e3776a1edc37709551d78707df5f8712d0663059d65dd0e4c342a7a3") read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1954.366692] audit: type=1400 audit(2000001588.500:62654): avc: denied { map } for pid=9054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1954.442983] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:49 executing program 0: r0 = msgget$private(0x0, 0x7) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x7ff, 0x3, 0x1, 0x0, 0x0, [{r2, 0x0, 0xde42}]}) r3 = gettid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) r5 = fcntl$dupfd(r2, 0x406, r2) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000080)={r5, r2, 0x5}) msgrcv(r0, 0x0, 0xffffffffffffffc5, 0x1, 0xa4a3ad41a879dde3) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000000c0)={{{@in6, @in=@empty}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0x20) [ 1954.508455] audit: type=1400 audit(2000001588.510:62655): avc: denied { map } for pid=9054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xffffff9e}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1954.645004] audit: type=1400 audit(2000001588.520:62656): avc: denied { map } for pid=9054 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1954.779870] audit: type=1400 audit(2000001588.530:62657): avc: denied { map } for pid=9054 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = msgget$private(0x0, 0x2) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/201) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x7) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10000006) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) msgrcv(0x0, 0x0, 0xffec, 0x0, 0xa4a3ad41a879dde0) restart_syscall() [ 1954.881844] audit: type=1400 audit(2000001588.560:62658): avc: denied { map } for pid=9050 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1955.052007] audit: type=1400 audit(2000001588.580:62659): avc: denied { map } for pid=9054 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfe80) [ 1955.206668] audit: type=1400 audit(2000001588.590:62660): avc: denied { map } for pid=9050 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1955.331069] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:50 executing program 0: r0 = msgget(0x2, 0x10) msgsnd(r0, &(0x7f0000000000)={0x3, "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"}, 0x104, 0x800) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0x8}}, 0x10) 03:59:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x2}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x2, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 03:59:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xf1db) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x6006) 03:59:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xdffb, 0x22400) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x1, [0x7790629]}, &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r3, 0x100, 0x1, [0xd8ff]}, &(0x7f00000001c0)=0xa) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80000, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000240)={0x1, "ded11af43253462f0138eed865cbc89f48528ffe797431402df5c57a7dd81164", 0x20a, 0x0, 0x4dd52f87, 0x2, 0x4}) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0xfffffffffffffff8, 0x20a, 0xd27, 0x7fffffff, r3}, 0x10) r5 = socket(0x10, 0x80002, 0xc) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000011916532ad8d20400e7ebd2685f17"], 0x14}}, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x492492492492805, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) r6 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x5) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1956.446442] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:51 executing program 0: r0 = msgget$private(0x0, 0x200) msgrcv(r0, &(0x7f0000000000)={0x0, ""/4096}, 0x1008, 0x3, 0x1800) r1 = msgget$private(0x0, 0x46) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0xfffffffffffffffd, 0x2800) msgsnd(r1, &(0x7f0000001080)={0x1, "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"}, 0x102, 0x0) 03:59:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000300)="f80fbd5da1b3c0f09d3d94815745711bc76fe5db01b2fc2212e65d8952d0e6c6a78d9f733c0b2e6e682851541ccb5deb7457e151cc1b5b5f36b48923af79e3e31d74d21dc9276ec6f239daf8840b23b84d41ef4054d550e46cfccfc13cb3a98b0115acdeb9a444078b26402b41c98ab137b29323385056b60a526b3761a836df03793a0d70bc210cdffb72830619e25a176e9093cd2f7638c729ff1729c356aa239337240d338a81f3518edc86ef1b5c6cd42d1cb29af9759c30b7c23ffae4fecf251357f1393e3a0323f95bd74bbf0ef60ffaf5f145b6f799b8b78adeefd3fdd5e5c640aeef43a440e9ff23509a446d6fa8496d4d073d1b98352d9ad48c32cc08b80ddf39dd47ed07b16dc93e526db098de8a840c9c65cbdbae98c40da0ef48e76429d4a74a2b228bfba5ed2eaf754154621255f65595ffaa2d79c49efd77849986e5dc12189002f11145da3d56c1ce8cac370b43b3cee8e8071c44f54f94f17368586f53dbaf3be6e5aba47cccac708235c3d6f75e18d397fd167aee63522153e59d14fc28996fae0c2ee0a6c582146530547829808681f6f631ece598d63118a08a4550534ac8ad228c05182eb2fee2a304b6d27db943307578e78c68b2b3889abf3158ec7fd4603aa7a6b601769724e669c4a3dc74afaeba1ed37b00ec985b1553e3452de574312e12114412bbefa695ac9d613fe505421f835f8c3a17aa04f20be028c321f176205f7da29dd81393125e99b68832a2", 0x218, 0x8000, 0x0, 0x0) close(r1) 03:59:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x300000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0xfffffffffffffff5, 0x6, {{0x4, 0x7353, 0x0, r1}}}, 0x28) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1957.359549] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:59:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x7) [ 1957.491807] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x1, 0x80) msgrcv(r1, 0x0, 0x0, 0x100000000, 0xa4a3ad41a879dde0) 03:59:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x100000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:52 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3, "f84c472a88f3fe94122a78470c"}, 0x15, 0x800) 03:59:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0xf8, "03fffb013546bad8445bb43fda869d8b97869be2331fa4ed6e2c903fd80311c3ad748cfe5416a51fed835631c4ea1f3bf1ef3a4836054b448ec91ff557838f10244f2166cbd67917dbf85cfda49c80d150c2929f68cacd6a200247c6277c36376b1f7a9c887377a96b3902d682ec863bbebea12b3a08fe55d3fb4549d55fb44a39f1024b278113c28d5f4142e2e6331f043f0766f74e593deff5355a1a31bb158668d845fbb2471dfea8bfdf23b261f7ba453c07688602f550c51a052cae8ec52098234efc1f6984f2d3730380024894122631373d86a3e3bd3e2cd0bac3eea7881d1d2aa8d4cb959904857b0a6a32e2a1089bfacafd2670"}, &(0x7f00000001c0)=0x100) [ 1958.477806] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x200000000000000) 03:59:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x200000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ustat(0x1000, &(0x7f00000001c0)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x800, 0x1, 0x10001, 0x3, 0x2}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000180)=0x8) 03:59:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6c008070df7568b3030cb0629f425b6da71d87133bfc55629201102e9da2aaab9921de9bfe112e344c4133268631140e827f8b950ce5af7e6f3c244ac9f2add4d8fc9d5afb56bfe561a277a63328b94ada91342a5c03ddc2a94878d33e3f769472ed3c395ac9759957918c28d2b22c8a49bde00f7038d15c9f05f1c21709c0286b52c10de3ea40aa08772ae3c66f5e7d2cc5f9c5d0502fab35a16f674f2a669cb43b44ad612d25cc199702b7bbe51b7faa86150ddb7a53949a973b5324d2db93842cb206bde3f500d298a4986609d9cc890d98265201c1025fc999ec374532d3cf6e1c736c056b"]) read$FUSE(r0, &(0x7f0000000580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:53 executing program 0: r0 = msgget(0x0, 0x2c0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000003940)={@mcast2, 0x0}, &(0x7f0000003980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000039c0)={0x0, @multicast2, @remote}, &(0x7f0000003a00)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003bc0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000003c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003c40)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003c80)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003dc0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000003ec0)=0xe8) r10 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r11 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='[\xa6[\x00', 0xfffffffffffffffc) keyctl$instantiate(0xc, r10, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'wlan1', 0x20, 0x5, 0x20, [0x32, 0x79, 0x38, 0x39, 0x38, 0x31]}, 0x35, r11) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'nr0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f40)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003f80)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000004080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000043c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000044c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000004a80)={&(0x7f0000004500)={0x558, r2, 0x810, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x110, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x0, 0x7, 0x8}, {0x9, 0x1a57263b, 0x3, 0xc76}, {0x100000000, 0x2aad5dff, 0x7, 0x4}, {0x1eb9, 0xffffffffffff0000, 0xdd6, 0x100000001}]}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r7}, {0x178, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r12}, {0x84, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x154, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x4, 0x2e21c1dc, 0x0, 0x80000001}, {0x7, 0x800, 0x9a, 0x6}, {0x80000001, 0x2, 0x7}, {0x2, 0x4, 0x6, 0x2}, {0x10001, 0x10000, 0x8}, {0x5, 0x2, 0x3, 0x81}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x558}}, 0x4) msgrcv(r0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde4) 03:59:53 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1959.274042] kauditd_printk_skb: 176 callbacks suppressed [ 1959.274057] audit: type=1400 audit(2000001593.940:62837): avc: denied { map } for pid=9157 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1959.403358] audit: type=1400 audit(2000001593.980:62838): avc: denied { map } for pid=9157 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1959.417379] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1959.543022] audit: type=1400 audit(2000001594.000:62839): avc: denied { map } for pid=9157 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x20000000) 03:59:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x50000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1959.769479] audit: type=1400 audit(2000001594.010:62840): avc: denied { map } for pid=9157 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1959.961839] audit: type=1400 audit(2000001594.020:62841): avc: denied { map } for pid=9159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept4(r0, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0xe73b, @loopback, 0x9d24}}, 0x8, 0x1847}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in={{0x2, 0x4e20, @rand_addr=0x16b}}, 0x0, 0xfa80, 0x8, 0x8, 0x2112}, &(0x7f00000002c0)=0x98) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r3 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x70, 0x24100) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000340)={0x3ff, 0x8, 0x4, 0x8}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRRPART(r1, 0x125f, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0x28, 0x12) [ 1960.158022] audit: type=1400 audit(2000001594.040:62843): avc: denied { map } for pid=9159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:54 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400200, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000fec000/0x14000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x14000, 0x1}) [ 1960.306307] audit: type=1400 audit(2000001594.040:62844): avc: denied { map } for pid=9157 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.498556] audit: type=1400 audit(2000001594.030:62842): avc: denied { create } for pid=9158 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:59:55 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x58) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$UHID_INPUT(r0, &(0x7f0000001580)={0x8, "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", 0x1000}, 0x1006) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1960.673629] audit: type=1400 audit(2000001594.060:62845): avc: denied { map } for pid=9159 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1960.831605] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1960.854385] audit: type=1400 audit(2000001594.070:62846): avc: denied { map } for pid=9157 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xb000000) 03:59:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xf0ffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46030107dd8dcce57f0000000003003e000100008018010000380000009503000009000000070020000100ffffbc0601000000000051e574640100000008000000ffffffffff00000007000000070000008b0000000300000002000000800000008764000005000000010100000500000004000000d53761455cfa1078d490daf3b7f0fde709bcd3ce84173fdb12e3258568094a8d8be9475797f71cd2c3ca691ac45252f0620b4c8aeecd269c8092de9e90c632089675e9050230229432cb3f84d312cf8384cb6fe1edd26bc185845c91485240b01934d5293921475eb9a8b8e80c1e057d1e0e5979928cc55ec0e59d127b64834e9810fd0058ffaee9cd6cf51589d8ac648759b059c1d711aeec0581ab7100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x215) mlockall(0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x58, 0x2, 0x1000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x1000000000000000, @remote, 0xfe88}, @in6={0xa, 0x4e20, 0xff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x200}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r3, 0x7ff, 0x57}, &(0x7f0000000180)=0x8) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000009000000c300e400170dd2e4cb8f33b4048a45c11f5fb3d7ab64b9af45419f15758bf696db16c745e08c303020cd32228234daa1fc197be55c6e8edfed6742bdc8e20a75128c49998b8295c4d358df7ec60ba5d01b8d57acfc742e66c8f0576e88014ca38a19abc92ec11407665af7d232d09b589d5c6be2730c962148270252239cbc898742004c46c7bd0b6c499803bad476325240357563f1366b3b13e4b6d59105efbfba10524ab7338c197657043a53124029df60a333841e16912b9681bf2c589ce861487f2a051edc17afa9d89642114e8c71f33296c165b68fc382000000000000000000000000000000"], 0xf0) 03:59:56 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x400) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000200)=0x800, 0x4) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x200000) fstat(r1, &(0x7f0000000040)) r2 = msgget(0x2, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) msgsnd(r2, &(0x7f0000000100)={0x3, "a970c31bbd83d0f5b614b6c14e41a77d42962e76ba09a1406e154644df0ed895542b73b1a67eddecc08c87947f397430f186aefa6b15cf306c24f5839b414fd72205e1923d84ff3030cd4920c9593a48a1c3074746f7926d93254420bfddcfb801a789c2d7ad1bdadb1b1e4d2e79efe1991f1ba26dc00599a52cff730cbe15721f57f9dd326a1816b7db56c22c761373b8e9a6674be3b6ad9bcf3fdc6a9b7df98bcb37349be12b6a4786f8f0d639f24000f7b364e052d7f1cdf98f1eb2ce284b82859c98d9709d6824e307b93c01b961c6b4cc330d4bc009dc7dae"}, 0xe3, 0x800) 03:59:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc1105511, &(0x7f00000005c0)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}}) fcntl$setstatus(r0, 0x4, 0x2000) 03:59:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x40000000) 03:59:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x9}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1962.162250] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x600}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:57 executing program 0: msgrcv(0x0, 0x0, 0xffffffffffffff94, 0x3, 0xa4a3ad41a878dde0) 03:59:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 03:59:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc1105511, &(0x7f00000005c0)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}}) fcntl$setstatus(r0, 0x4, 0x2000) [ 1963.073571] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:57 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x900) 03:59:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xfffffff0}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f8a6d6f64653d303030303030303030303030303030303030343030300e2c757365725f69643d28eb274184b6ee5cd0a9dc6caec02e3d145bfeb3aca9228b0000142567a0a6bb75af623124cf1d95d7edf48f842158fe1075fc255a1ec52945f87c24ac96f066c630ed159381d40354ad36597b5fd3e77d1980baa134815060063b871da1324c29d829b0b642cccb04a7de5791e694f408180133c851d4c64915c30e18a9526d4695", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00008e04407c47a949b21fe582ee31017390d9ac00cb1bb356337b15bdb6bf60ba34171dcb40d2401ff95328728e05b0415478a0ac099ed6c011432f4a418e599bff45f96195b1a77f5e7e1bf1860f83a1b7331ba03abd99fdba25db2f67f6933b93d10177d4538c1b52a8c40ace2dc04b053d1b4bfc61dce4a7d580349056f9548b4747dc071c296485f52326c61be7c14727c98da18afa09a98cd4246e0940114673c3ea720c897ceb0358e9247796571c987a67f9b95abd07a8788138f59faa970deea61fda0bdddf9a12cc68ba83286e99d05f0f2242fb7aada346122ba3d24c594ee61c52c4dd858c902f2c6d0fd97029325026"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = dup(r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 03:59:58 executing program 0: msgrcv(0x0, 0x0, 0x9cc08c99, 0x0, 0xa4a3ad41a879dde0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x14b440, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xffffffffffffff29}, 0x2) 03:59:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget$private(0x0, 0x20) msgget$private(0x0, 0x5) msgget$private(0x0, 0x0) r1 = msgget(0x2, 0x0) msgrcv(r1, 0x0, 0x226, 0x4000000000000000, 0xa4a3ad41a879dde0) [ 1963.962596] openvswitch: netlink: Either Ethernet header or EtherType is required. 03:59:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xad0}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 03:59:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc1105511, &(0x7f00000005c0)={{0x6, 0x0, 0x0, 0x0, 'syz0\x00'}}) fcntl$setstatus(r0, 0x4, 0x2000) [ 1964.279732] kauditd_printk_skb: 180 callbacks suppressed [ 1964.279748] audit: type=1400 audit(2000001598.950:63027): avc: denied { map } for pid=9245 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xb) [ 1964.450281] audit: type=1400 audit(2000001598.970:63028): avc: denied { map } for pid=9249 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:59 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) fcntl$setsig(r0, 0xa, 0xf) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105000, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000040)={0x401, 0x108, "3ea0f906c7069c71ded999ff17965b678b347234d189f35e0cde69676eac7b96", 0x184f9cfb, 0x200, 0x3, 0x3, 0x80}) [ 1964.622056] audit: type=1400 audit(2000001598.980:63029): avc: denied { map } for pid=9242 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1964.769180] audit: type=1400 audit(2000001598.980:63030): avc: denied { map } for pid=9249 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:59:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/232, 0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) write$P9_RLERROR(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000e3e0e8e8bfbd52000000"], 0x9) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 03:59:59 executing program 5: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0x401, 0x7}]}, 0xc, 0x3) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x140, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x80}}, 0xfff, 0x1}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r1, 0x1e}, &(0x7f0000000240)=0x8) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x101) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000040)={{0xff, @dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x4, 'none\x00', 0x26, 0x0, 0x4f}, {@rand_addr=0x9, 0x4e22, 0x10000, 0x7d7d, 0x7, 0x6}}, 0x44) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1964.932730] audit: type=1400 audit(2000001598.990:63031): avc: denied { map } for pid=9245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1965.071869] audit: type=1400 audit(2000001599.000:63032): avc: denied { map } for pid=9249 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1965.198221] audit: type=1400 audit(2000001599.010:63033): avc: denied { map } for pid=9245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1965.201103] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1965.314900] audit: type=1400 audit(2000001599.010:63034): avc: denied { map } for pid=9249 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x4c00000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1965.459439] audit: type=1400 audit(2000001599.020:63035): avc: denied { map } for pid=9242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x660) [ 1965.612721] audit: type=1400 audit(2000001599.060:63036): avc: denied { map } for pid=9242 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:00 executing program 0: msgrcv(0x0, 0x0, 0x149, 0x0, 0xa4a3ad41a879dde0) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ppoll(&(0x7f0000000000)=[{r0, 0x8001}, {r1, 0x8400}], 0x2, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0x4}, 0x8) 04:00:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='l\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xa000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x8dffffff) 04:00:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x100, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000000) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1967.306142] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x1e8}}, 0x20000050) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000680}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r1, 0x411, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000045}, 0x80) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746db28c653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) delete_module(&(0x7f0000000180)='@}T(\xf4&(systemself\x00', 0x800) 04:00:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0xd00a000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:02 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000300)=0x1c, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x101000) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080), 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r2 = msgget(0x3, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) 04:00:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x11000000) 04:00:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:02 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1968.285085] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x47030000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf000000) 04:00:03 executing program 0: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x103000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000001c0)) move_pages(r0, 0x4, &(0x7f0000000040)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil], &(0x7f0000000080)=[0x3], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x4) 04:00:03 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xe00020}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r1, 0x415, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40015}, 0x40001) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmodj=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = pkey_alloc(0x0, 0x2) pkey_free(r3) umount2(&(0x7f0000000100)='./file0\x00', 0x4) read$FUSE(r2, &(0x7f0000000580), 0xefee) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x1) write$FUSE_INIT(r2, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000003580), 0xfffffffffffffdfb) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1969.219499] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1969.291476] kauditd_printk_skb: 158 callbacks suppressed [ 1969.291490] audit: type=1400 audit(2000001603.950:63194): avc: denied { create } for pid=9340 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7f010000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1969.486517] audit: type=1400 audit(2000001604.000:63196): avc: denied { map } for pid=9339 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe) [ 1969.670894] audit: type=1400 audit(2000001604.010:63197): avc: denied { map } for pid=9339 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt(r0, 0x5, 0x2, &(0x7f0000000000)="5edd9334c9e57cb587d060cd99c465b2ed61de9579ef3cec630d9ada53b48904835e8ebbc7b4e4348acf2d700122b64d74ba4b3a914eef57436e4c97ba7fbcd86bf4a80c364b4e43bcbb35b719973bc052598e7ecef9ae8211ac4e8e9be803c0591d8843944f5243a9faea206f18d08fa5faa4efecc5c2e39e2f7b701849894a03f933b4e5921b892841a537352fff3c11685505e4e0521ac3ef20e07285", 0x9e) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1969.854399] audit: type=1400 audit(2000001604.010:63198): avc: denied { map } for pid=9342 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1969.981216] audit: type=1400 audit(2000001604.020:63199): avc: denied { map } for pid=9347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000100)) fcntl$setstatus(r0, 0x4, 0x2000) [ 1970.121648] audit: type=1400 audit(2000001604.040:63200): avc: denied { map } for pid=9342 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1970.278212] audit: type=1400 audit(2000001604.040:63201): avc: denied { map } for pid=9347 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4400, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e23, 0x0, @mcast1, 0x5}, {0xa, 0x4e23, 0x8, @mcast2, 0xfffffffffffff4a9}, 0x5, [0x20000000, 0xffffffff7fffffff, 0x6, 0x4, 0xfff, 0x167a00000, 0x609e, 0xfffffffffffffff8]}, 0x5c) [ 1970.409915] audit: type=1400 audit(2000001604.040:63202): avc: denied { map } for pid=9342 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1970.438923] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1970.548353] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1970.597973] audit: type=1400 audit(2000001604.050:63203): avc: denied { map } for pid=9342 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x7400}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x5) [ 1970.747967] audit: type=1400 audit(2000001604.090:63204): avc: denied { map } for pid=9339 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4800, 0x81) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = geteuid() r2 = getgid() write$FUSE_CREATE_OPEN(r0, &(0x7f00000000c0)={0xa0, 0x0, 0x7, {{0x2, 0x3, 0x366d, 0x81, 0x1, 0x0, {0x5, 0xa719, 0x1f, 0xbd54, 0x75a, 0x3, 0x3ff, 0x5c5, 0x100, 0x3ec, 0x10001, r1, r2, 0x8001, 0x1000}}, {0x0, 0x6}}}, 0xa0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:06 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x101, 0x48000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x3, 0x2, 0x5, 0xffffffffffffffee, 0x9}, &(0x7f0000000300)=0x98) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x3f, 0x6, 0x3, 0x31, r0, 0xf5b3}, 0x2c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e23, 0x5, @remote, 0x100}}}, 0x84) [ 1971.549974] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_TSC(0x1a, 0x1) msgrcv(0x0, 0x0, 0x0, 0x1, 0x800) r2 = accept4(r0, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000180)=0x80, 0x800) sendmmsg$alg(r2, &(0x7f0000002340)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000001c0)="3ff21beea3ed8ef2b5eba8e29d07d5121584b008a198011939c73fe9421f0ec5becfb7d43eb192ec91a27bdc3e89351f0e300bd89db85505294b1c6487326bc7e5d69a38d105b0afb45b3b8e89dab41c9f4ae8af1b233dcb2ad1b9c91db1af4fe1bea5ede0bfa2911eace37a52c7eac16641e4bba7d6c6c34cd803ef1b334f70387f7afa044a6987df239ffb5097f523485775", 0x93}, {&(0x7f0000000280)="b91ee1e922594768e9a7b2e543e95988cc614fe25a09c3926a6060929bbaf7fc91b0ab3b9a543d1ee0b8beee2f887fcb31d9ee5bd852c5d9baaf2788508046afd0724f7320e7792f9a5aadcdda9add59800c441a3b1e5530b7e8541eafa5d16f6105df527dffd0f7a4b204b51c1ab71cf216b091c1fc9657ade493dc3a7e117ff39f2e500150ed0f3cadfb30eaf2ab3c4b1280b5f553c4af50fc52c467133f962de3e5c88509790add54663af98db100b6afb8018d560576ecffc76d4c56c5d1", 0xc0}, {&(0x7f0000000340)="336234b23b2e3b68bd0526", 0xb}, {&(0x7f0000000380)="ed56ec4e46be8dcb2b0745b5540364f455354d1d009ae77d1fcf7dbc7ac9de4c55ef19ba0752ccd807e7db6c353722e8d78c9c4e168c2c650fbc7419a53ac007abdc7cc9c12253ceb7a0ba63620c12b78dfbbc6fef434152139ddf6fbc7612d918f789e7da056c899cb19e1d3b3da9a6120e77d5204c5e50ca86d46a29078c93ec714432709c38d601d6731c1d741232eb5cec0c7167d4c2c6242a0c7d9c40be9cd1c1f20c165bf816c72147a88a2a8922f11e", 0xb3}, {&(0x7f0000000440)}, {&(0x7f0000000480)="3b71c546c9ec2349a5125a05358ec4d7683588c4881b18a21e4087ce8c261bfe3fde36e99bbf8d79b66b4f8cb5cec370ebf13bdd362cbc3ce47dbf6ad7170a2cf2e35cf04453c4d8d4b315003c884d43c018c5a7be02b5ecb596d69066cc528afabf1af405955185f7b1295c8acf078c4fda555a321ee375a00c7d4239be93bdde81133d3ae8d19c32c82ad7f14148045aa42435c9778b327d9645e672d1a2b07545a84422aea3d53ade36c1b62d02b854829a16923cd626f0fa79020e54dcc11b2b982185a6308636ae7225b842819921fb0258e9c0ab75d6939d79d886e089e61a5d76a6407382ceb7f5cf03d2352259bf", 0xf2}, {&(0x7f0000000580)="2ef169d76c15302bf714b704f7aac674bb04777ec9707406442fa77b8bf20bf69a5f72bdc5f9d335d0e871a442cf661d08275cbd595fddff430f701cef830759fdc46ccb346a20835981c826070bf3fa28436ccea57956c284fb9e082d616e7038f3f328d504020f78354974ab0b71e40a1436a2aaea9b40b6c9", 0x7a}, {&(0x7f0000000600)="d3598b3379364e7cbaa26768246ec74967075ae9cd9c762d6283b826be5b2a2bd8d80f5cd0ddcf94fcdd13207db1c15fcb25d07c65e11ecbdc03743efdaaf52b99aba81604d92258dfd0a9344dd23611fc63f4de92c53fab02cccfe65cc49c8861cf", 0x62}, {&(0x7f0000000680)="bd2384c5ff511d523e0e3ba13c18f16b87f19f54c0cca73d80434a7d69885dce6f3e3da6381155e5d201c87c5c165346e9f3be471a9db494c5552132e7701ace12ef54eabdd2570eb67ce5b4f9978a87d1b6ef35960c0cd1bfe5c160447850f48448c9cac7b1c10a349a296c20481799962dbe40817c7b6f48ea6db096", 0x7d}], 0x9, &(0x7f00000007c0)=[@iv={0x98, 0x117, 0x2, 0x7d, "d303d74277360fcd742b5b9381990582db3a91d4509d7efc6f938dfcad32762a7976c25bb40884864c6e1818ac2fa19e096f712ad90f5f02269e341725b2193698399bc252b03e871b1c2cd334a490e595396560633dca87068a2786691b77f55c42cfc7c8f76a101f9f41fa9cfb8a4cb569a0b1c09cac8b6b2f82d854"}, @assoc={0x18, 0x117, 0x4, 0xac0}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x80}, @assoc={0x18, 0x117, 0x4, 0x7ba}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x32}, @op={0x18, 0x117, 0x3, 0x1}], 0x1158, 0x8000}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001940)="b91cff73b0ca30d1e3600299d5766d568ec47bea56ca42d914d6a8f739656d3d6c732020433df3c6b2585d3a745b4e371999c893322a926045e4d35c50ed178165b93eb38f561a3678cebb377f22d40d5e8fb97df44798d2d3b96c0e0e76ebc885b211c2643041084ad922cacad81abc530826c00d7f59c3aef7fc039c42760547fda283670f7c07fc36ffb9b6ec292140f3bb3105b31ac1f68138a29b7f59e9401dbf32d4ad12f2ce4b43b26b42342f93ac73e77ba52685d893c5e81e3339467e657691fc02e31f2cd85e863218cd358e0eb18f2dd20c9bfac480753875e4686c1412", 0xe3}, {&(0x7f0000001a40)="f56b7cc89607cb7ddecfd263c62b8548cfab139322cf276fad6750f87d805004e7b4dc310a1f837906293861ad130ea6bcf76462d40e7abe442c9d6c77d4b1ffdb7a64e787a9bad4c82c7b6914c07a91b502bb0c30fc575a51bb4f99", 0x5c}, {&(0x7f0000001ac0)="d671c1894112", 0x6}], 0x3, &(0x7f0000001b40)=[@assoc={0x18, 0x117, 0x4, 0x8f}, @assoc={0x18, 0x117, 0x4, 0x100000001}, @op={0x18}], 0x48, 0x20000000}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001bc0)="3e04b6b61298f19a6296ee03b09c3276469caffaf6001344bef1051f4e3ded7c427368dd49b99c676b39d9bb7734491155e8ed5295f970237668254d982718fe8f692c074b1047eaf34e1fa0", 0x4c}, {&(0x7f0000001c40)}, {&(0x7f0000001c80)="54d7b4e15e7e838044ba897ea21e48a671776cebee02656efb1c4963e9931183061a34b16fa3628d35f98a0d07d87114f30856f47ebcfc3aa519785b2b5a6a3a88f2a1d5f09edde98b0e0d2ab9b8d323ce31dfc44700fb47059dbca383d3409f0c2649f847a1128a879b3d305405c35173a4d0b2aa25", 0x76}, {&(0x7f0000001d00)="07048757b5686235c0210394581bf24e93a22be8cb31987340d79af27e10fae155050c46a7cd342706ee2d159d5953990b13d27e8f7555ff0723ce63800d740423fdbd301c23e7fbf01b80d55e0e82b73140a363e5cea3d7245644382cdd87843749e0", 0x63}], 0x4, 0x0, 0x0, 0x4000000}, {0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001dc0)="0121aaed6811916bc2e0101f6c746a07cfb330e6199431faecb7fb783b7d37d9cc9c051083d1537d944e0c401eb0ce9db186a940523ae2425016", 0x3a}, {&(0x7f0000001e00)="b9e2f0350007f2632cc56ae6ca", 0xd}, {&(0x7f0000001e40)="065dd2af961dbf3aada4cefe59aab68e88b0debed9bc6c7ac68a4df9a6aeedf435d604844b51d007b434b0914b990cec65180ac56572d8019fa0c2b0ab9e263e3e162ed6afc419b46d4acb4fca43c6ac1ab51b16396342ee64f9f2d37efe6a013e00d367bce11dd3db71d7fb5f53679ab0840143768e7b315aedc023d8d853aa7ff5574efe0667a7b2cfcae3f149637ac668fb00ec8549b623d8379503aa90b5c4e4ad50c7224331c3f5a61ef2fe9f2e7ea7ff88c6a0988a0ebaa12773", 0xbd}, {&(0x7f0000001f00)="ebae9e8f267bf28f16bda7be2812bd807965b3ffe97f6361709c7d39f06eb18bd36fd23c638a08c02003c9c330fd07361fc3125ca28bc88f8f275f85c47e22f3c7554a5c6fd9c26a9776d7bfceb762d2b677804918bc6a5862c5a25e6786b1029fcf9ad10cf85d7eef10", 0x6a}, {&(0x7f0000001f80)="fa85a1d593548804900b5a855652f838bc1078d8531a6f34608e21648933d333b2b85aefadba9064e4bea3c275233d63bd4c1da099711851de7cba498f545d0d06f00cd62e9eb15047f02bfd9529ab1f2e85475ff884fc8a7b2b37d5dec000c2e5fe9da3c69669d986a2a5d706d48e", 0x6f}, {&(0x7f0000002000)="342c718d4d02508c4e3d7a8e9ff8396ab2b9593cc84315b5e55dabc1d7b7653f76c971251082a7f69e9654626f5b9b796e98014cf8e3c0870562954d1c13271ae14fdde5c174eea3611ea0b8a120eb5ecd0ba8cde0bf1bbc486383e9976708215e7b57f0f0e327c311702d59c09a9436ec5501576b065d42d4fc0238b7d0ed23d73cbd46347afed5ff895cb15959dfc12f39799c36d71d7c2ed26da54d44b019356f7345da3145e2463cc8a7683ee2caca5ac9891a7727c4bae7ce6ffde4706fbfb7c25d51ae241f6b4791737de71a4bd5cd7f574bd4be5843449688fa0bfbfa25e2dbb3ea02214ea55fad267444", 0xee}], 0x6, &(0x7f0000002180)=[@iv={0xd8, 0x117, 0x2, 0xbd, "ea6e627dcbd8988f6c9fe8233cb4d19d452ef23b10f0a2569ed2fb1109e94887c7b0443ef148304d0c9d623aa8b28dc0f8aa61e8915734a7212b1f00f0fbcab49b9ffdd8508b57783a47af46f864ef504bff4a6739d52d783f6677a1e14a4bded246bda4c6395535bc4cb1a123b1b8f99502034c7f3e0aa2db960737a0057bdfb6907cb1d1cc1155cd331bff229bf3917ee7f9ed5892a3c060ca8d6e9d3df0bd30b4dd5f469b0796a2c80b6b959e0bb500c1dfdd9c329b30d54b4ce638"}, @iv={0xe8, 0x117, 0x2, 0xcf, "e866fad5726d9c4d6be660d6911fa425f9f43a915c30bf8e3db447422637380c750d197c8130eaefdb04991ceaa468516443323d485444cef8f5919ccfb93663b87a0d7bd4fbb2a65f3155a4f33e7adaf24bfd84e1540b6cc21f584213ea6e62022aec96fd8513e0ba5b1f18b2a25b60d9a62dff88809c8d5b138e6f10d7513e11409b8ce62680dfc64fb06660e880c73e17cb35ae2e4b583a20464ce9bffa5929d1a1f03e40aabcaca555acce52d798e022d30be241c8f52df5b6635b7ced813cabb7e8a92b00e25a41d57e00112b"}], 0x1c0, 0x800}], 0x4, 0x80) 04:00:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x6800}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1000000000000000) 04:00:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64a63d30303030303030303030303030303030303034303030302c757365725f79643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:07 executing program 0: msgrcv(0x0, 0x0, 0x317, 0x0, 0xa4a3ad41a879dde0) r0 = shmget$private(0x0, 0x4000, 0x114, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/165) [ 1972.509988] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x440000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x53, "a8b68d26d8763d6ceb751b7e2841201c3398de6daa6190ea72b20f2a0b459fc65ce8001d4d2b93770f2c56360f8e5e69775e2bd81e7fe47e6d8673e31806dee24449bbc6c95663409f2881c0610fb5f99112a8"}, &(0x7f00000000c0)=0x5b) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e23, 0x7e06, @remote, 0xfff}}, 0x5, 0x1f, 0x10001, 0x7, 0x1}, 0x98) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400210) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000001c0)) [ 1972.663274] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x74}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x8001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x39}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xff00) 04:00:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) eventfd(0xfff) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200400, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/175) msgrcv(0x0, 0x0, 0x3f, 0x0, 0x3000) 04:00:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1973.803062] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x346) 04:00:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000000c0)=[{r0}, {r0, 0x8000}, {r0, 0x200}, {r0, 0x1056}, {r0, 0x8000}], 0x5, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0x4}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000\x00\x00\x00\x00\x00\x00\x00\x00d=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001580), 0x1000) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:09 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ftruncate(r3, 0x6) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000280)={0x2ce7, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x1, @loopback}}}, 0x108) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r5) read(r3, &(0x7f0000000040), 0x0) [ 1974.712359] kauditd_printk_skb: 190 callbacks suppressed [ 1974.712373] audit: type=1400 audit(2000001609.380:63395): avc: denied { map } for pid=9442 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x40, &(0x7f0000000080)=0x2) [ 1974.877988] audit: type=1400 audit(2000001609.390:63396): avc: denied { map } for pid=9442 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1974.946652] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1975.034009] audit: type=1400 audit(2000001609.420:63397): avc: denied { map } for pid=9442 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x8004000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1975.194002] audit: type=1400 audit(2000001609.430:63398): avc: denied { map } for pid=9442 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 04:00:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1fffff) [ 1975.381110] audit: type=1400 audit(2000001609.490:63399): avc: denied { map } for pid=9442 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1975.545123] audit: type=1400 audit(2000001609.540:63400): avc: denied { map } for pid=9442 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000040)=""/9, 0x9}, {&(0x7f0000000340)=""/148, 0x94}], 0x4, &(0x7f0000000480)=""/229, 0xe5}, 0x40000022) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootlode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000000580), 0xefee) [ 1975.677983] audit: type=1400 audit(2000001609.550:63401): avc: denied { map } for pid=9442 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1975.841557] audit: type=1400 audit(2000001609.580:63402): avc: denied { map } for pid=9446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:10 executing program 0: r0 = msgget$private(0x0, 0xa5) msgrcv(r0, 0x0, 0x0, 0x4, 0xa4a3ad41a879dde0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000180)={0xfff, "55e1fe755b31fddfb2540172caca7e7bfe818761cc3850d7c6ae65809cc8c817", 0x2, 0x1}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getitimer(0x3, &(0x7f0000000100)) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000040)={0x0, @src_change}) [ 1975.963330] audit: type=1400 audit(2000001609.580:63403): avc: denied { map } for pid=9446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xc0101, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x440000000) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1976.085847] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) [ 1976.130274] audit: type=1400 audit(2000001609.590:63404): avc: denied { map } for pid=9442 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x5000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:11 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3e8) 04:00:11 executing program 0: r0 = msgget$private(0x0, 0x100) msgrcv(r0, 0x0, 0xd0, 0x3, 0x27fc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 04:00:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x680, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x1e, 0x4, 0x8}}, 0x14) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:11 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4000c0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/240) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x4c, 0x0, 0x0, 0x26, [], [], [], 0x7fe, 0x80, 0x6, 0x9, "178d40a3e2c2898cab6be82b3f01be97"}) r2 = msgget(0x0, 0x302) msgrcv(r2, 0x0, 0x0, 0x8000000000000, 0x1001) [ 1977.176426] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) [ 1977.318827] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xf000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x8) 04:00:12 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9b0004, 0x0, 0x1, [], &(0x7f0000000140)={0x9e0902, 0x0, [], @ptr=0x6}}) [ 1978.340687] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1978.458489] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4800}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:13 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x81) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) 04:00:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf) 04:00:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4ba9, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000700)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r3}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c70725e3d9b6f01138571643de2163c70d0c35b9f19ed06a5a806570843cbf042c8d8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1979.492451] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xe}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:14 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), 0x4) r1 = msgget$private(0x0, 0x1) msgrcv(r1, 0x0, 0x314, 0x3, 0xa4a3ad41a879dde0) 04:00:14 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x3ff, 0x0, 0xfffffffffffffffc, 0x7, 0x8}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x6000, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000000c0)=[0x2, 0x1000]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x4, 0x10000, 0xa, 0x6, 0x2c8, 0x7ff, 0x9, 0x8, 0x8, 0x4, 0x6}, {0x0, 0x0, 0x1c, 0x7ff, 0x3, 0xffffffffffff8000, 0x7fffffff, 0x0, 0x4, 0x2, 0x9, 0x166}, {0x5002, 0xf000, 0xb, 0x80000000, 0x5, 0x200, 0x9263, 0x7, 0xfffffffffffff001, 0x5, 0x1f}, {0x1d000, 0x3000, 0xd, 0x7fffffff, 0x80000000, 0xac4e, 0x9, 0x20, 0x62f, 0x1, 0x8, 0x8}, {0x5000, 0x100000, 0x10, 0x8, 0x20, 0x2, 0x7fffffff, 0x4, 0x6, 0x7, 0x20080000000000, 0x1}, {0x14000, 0x3002, 0xf, 0x1000000, 0xffff, 0x0, 0x8, 0x7ff, 0x100000000, 0x8, 0x8}, {0x10d001, 0xd000, 0x1f, 0x800, 0x101, 0x5, 0x2, 0x400, 0x6, 0x101, 0xa00000000, 0x4}, {0x0, 0x2000, 0xe, 0x1, 0x6, 0x1, 0x1, 0x10001, 0x7f, 0x2, 0xb8be, 0x4}, {0x1f000, 0x6004}, {0x16000}, 0x2, 0x0, 0xf002, 0x40, 0x8, 0x0, 0x13000, [0x400, 0x20, 0x400, 0x3]}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfec0000000000000) [ 1980.115760] kauditd_printk_skb: 172 callbacks suppressed [ 1980.115774] audit: type=1400 audit(2000001614.780:63577): avc: denied { map } for pid=9546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1980.184141] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x600000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1980.288235] audit: type=1400 audit(2000001614.800:63578): avc: denied { create } for pid=9545 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000010", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0xffffffffffffff5e) [ 1980.452317] audit: type=1400 audit(2000001614.820:63579): avc: denied { map } for pid=9546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:15 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3a5, 0x101e01) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x7ff, @mcast1, 0x8}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x8c, @ipv4={[], [], @local}}], 0x58) msgrcv(0x0, 0x0, 0x0, 0x3, 0x2800) [ 1980.604082] audit: type=1400 audit(2000001614.820:63580): avc: denied { map } for pid=9546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) [ 1980.821491] audit: type=1400 audit(2000001614.820:63581): avc: denied { map } for pid=9546 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1980.949102] audit: type=1400 audit(2000001614.850:63582): avc: denied { write } for pid=9545 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe00) 04:00:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000040)={[0x1, 0x3002, 0x0, 0x16000], 0x9, 0x8, 0x3}) [ 1981.170754] audit: type=1400 audit(2000001614.880:63583): avc: denied { map } for pid=9546 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1981.278469] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1981.318893] audit: type=1400 audit(2000001614.910:63584): avc: denied { create } for pid=9545 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4703000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1981.467981] audit: type=1400 audit(2000001614.910:63585): avc: denied { map } for pid=9548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:16 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) prctl$PR_GET_DUMPABLE(0x3) r0 = msgget$private(0x0, 0x3) msgrcv(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7e, 0x1, 0x1800) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x200000, 0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9c000000f479727985e82546047550d0134afe81f7a91782f5e0bcb281e0fad61159d5f07f484b2c960b4c5030aa8c7737212c8bad7057fea255af7e653384c651852da1ab070290d5df", @ANYRES16=r2, @ANYBLOB="20042bbd7000fddbdf250800000008000500ff7f00001c0001000800060077727200080008000500000008000800080000004400020008000500ff0100000800080001000000080008009000000008000b000a000000080008000800000008000b000a000000080009000500000008000300000000002000010008000500030000000c0007002100000000000000080004004e210000"], 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) [ 1981.613244] audit: type=1400 audit(2000001614.910:63586): avc: denied { map } for pid=9548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mlockall(0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030174d162b30303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT=r0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 04:00:16 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 04:00:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x500000000000000) [ 1982.244941] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x17f}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:17 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 04:00:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000200)={0x5, {{0x2, 0x4e21, @remote}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000000c0)={r4, 0xffff, 0x14d8, 0x6, 0x0, 0x5}, &(0x7f0000000100)=0x14) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f00000002c0)) 04:00:17 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x4, @loopback, 0x9}, 0x1c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x2, 0x0, 0x1, 0x8, 0x2, 0x61}, 0x20) 04:00:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xb00000000000000) [ 1983.219632] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x6800000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:18 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) 04:00:18 executing program 0: r0 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='Zeth1]eth1keyringproc\x00', 0xfffffffffffffffc) r1 = add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r0, 0x8, 0x6, r1) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='xfs\x00', 0x8000, &(0x7f00000000c0)='bdevcgroup\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0xa000, 0x0) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000280)=0x7) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) 04:00:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x60060000) [ 1984.159491] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x6c00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:19 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8180, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000080)={0x6, 0x2}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0x7}) 04:00:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 04:00:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3f00) [ 1985.126379] kauditd_printk_skb: 187 callbacks suppressed [ 1985.126395] audit: type=1400 audit(2000001619.790:63775): avc: denied { map } for pid=9640 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x6000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1985.318065] audit: type=1400 audit(2000001619.830:63776): avc: denied { map } for pid=9645 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) r2 = getpgid(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000140)=0x9, &(0x7f0000000180)=0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group^id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001580), 0xfffffffffffffeef) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1985.435397] audit: type=1400 audit(2000001619.780:63774): avc: denied { create } for pid=9644 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:20 executing program 0: msgget$private(0x0, 0x40) msgget$private(0x0, 0x100) r0 = msgget$private(0x0, 0x400) msgrcv(r0, 0x0, 0x3, 0x0, 0x84a3ad41a879dde0) 04:00:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) [ 1985.611840] audit: type=1400 audit(2000001619.840:63777): avc: denied { map } for pid=9640 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1985.757548] audit: type=1400 audit(2000001619.880:63778): avc: denied { create } for pid=9644 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1985.929872] audit: type=1400 audit(2000001619.880:63779): avc: denied { map } for pid=9645 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x500) 04:00:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x1, 0x400) msgrcv(r1, 0x0, 0xfb, 0x4000000, 0xa4a3ad41a879dde0) [ 1986.127985] audit: type=1400 audit(2000001619.920:63780): avc: denied { map } for pid=9645 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1986.295518] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1986.310297] audit: type=1400 audit(2000001619.980:63781): avc: denied { map } for pid=9645 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x600}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1986.437882] audit: type=1400 audit(2000001619.980:63782): avc: denied { map } for pid=9645 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1986.574797] audit: type=1400 audit(2000001620.050:63783): avc: denied { map } for pid=9645 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:21 executing program 0: r0 = dup(0xffffffffffffff9c) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0xffffffffffffff1a, &(0x7f0000000040)=0xfffffda7) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000080)=0x1000) 04:00:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 04:00:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) 04:00:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x8004) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4a0cc6d2) [ 1987.321151] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x48}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1, 0x0, 0x0, 0x0}, 0x0) 04:00:22 executing program 3: msgrcv(0x0, 0x0, 0x0, 0x3f00, 0xa4a3ad41a879dde0) 04:00:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/8) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0x40000000, 0x0, "709759d39ff4e75ad0b3f584087f5b8dd16cdbc5eb57dd5bb4d6f9772be2224c", 0x2, 0x918, 0x9, 0xb24d, 0x6000000, 0x100000001, 0x8, 0x6, [0x2000000000000000, 0x3, 0xfffffffffffffffc, 0x5074]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x46030000) [ 1988.389614] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) 04:00:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x9effffff00000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x36a7, 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x8, 0xa00) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000001240), &(0x7f0000001280)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x529080, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000040)) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x1015, 0x7, 0x4, "4e3be08a9ba5c0c11006c7a28063dd5a", "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"}, 0x1015, 0x2) r4 = msgget(0x2, 0x400) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x200000005, 0x800) accept$packet(r3, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 04:00:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1100) [ 1989.414322] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r2, 0x410, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x4000) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001580)=""/4096) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x200, 0x0) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f00000001c0)={0x4}) 04:00:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x6c000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x50) [ 1990.150057] kauditd_printk_skb: 149 callbacks suppressed [ 1990.150073] audit: type=1400 audit(2000001624.820:63933): avc: denied { map } for pid=9736 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.184471] audit: type=1400 audit(2000001624.850:63934): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.286926] audit: type=1400 audit(2000001624.890:63935): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x10) 04:00:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="529b45c70bd4b29dfdafacc0d6dcddb81d1257597c77a066ae8d0579002aba13dbbbb7051ce9d3355b7b54115e79b77ee0e7035acc25ba5a9571287ca7f9af4d9575c6f237f76e99db3d62b9e80fe6dae118a06d751fcf2b3f66aef873dce457e448682058339d66d13da01a71b5ba043ca4f2b81f80473cd2b143852023cc64b7a297f51bdc0a90bd6ebd6b6b784faab6ce39176c36777ae1c9743884ce9576", 0xa0, 0x6}, {&(0x7f0000000140)="70e4131351f1fd6be7405b4edcfc05e78faa06e3167a3f211f6a1db8b1e4a3f66c898ee1f0e38db64205647a1de5103906679236374e96d71d23c4a5adc84140ff1471818786a9d7f5f1d55dd88256b80e7a679de8730d69439ee69c685daa797beb7c1ecb6bc0aa8cc6c22ac6bef5bcbca569f5fc9619270e3dde647b78eb56f2e1eaef16b7754e43b917b209b209232ab969b224b96e3e4e00abebd15e6a0a76f65a2b81dea382a0cea26ca78025889d0158f3551eec9e4687b111caa0658b9ac9dcb3c6dd757cf3b4d27ff5f559134c91808892", 0xd5, 0x6}, {&(0x7f0000000240)="7da89f60d0cce77459eea38432a2f8c28331e90e611d7683e4e0d86ea9497d776d24d5a5a24823c36d1815c510f7074671c523167b8924e25a10ba1440ef638d4d8a443c978668c13c8b922a46b51124dec34f9eea98fa410b12bda5cb6c5eda701b236a0dd073f9cd3eea4d845b8cefb50035ae9136f4df00a55eb260000c0b48be6d8c382f37508943704ce5a7869514885e88e9785334ec4835045deaa7", 0x9f, 0x7b5}, {&(0x7f0000000300)="df162a82adc308ec7624ba360c2f3debd708bd32f885965db5c6fa5d4c730d8269e297ba85aa4c7d714a7106d768579de044d43c136a777b32c3854cad18c932fba4bb59de0a8d4240cb3928cf55b3f1988958ae6bd79cdec98e6fc7e692e70b05d3fc4edde96ca363faf541f4631c529df01aa768eafa7b9f83e99f80306cf4c7b350c2eaebec8df300e409f71b364afd6daa595f279ea5638ae7b82a3e5410cbbf51e5e11cadced2800f49c9ede16057f6e1e84c0640bacee05c", 0xbb, 0x7}, {&(0x7f00000003c0)="5c9aa67547a6939d4cd644ac7e9cd361ac707cfae248d5a693a44a46d0fd1146f3bb4ee9084da5fc373e124dcbc96590b7035f377ab87fcb117859441879fe7709c265c52112f1515df6e2b0cc9f92fc3aef285b8c492c76382bb894b5e6c3cdfa928fd107ed16c3", 0x68, 0x1}], 0x1000000, &(0x7f0000000540)=ANY=[@ANYBLOB="726772706c76622c6e6f626172726965722c6e6f61636c2c7375626aef41aaafe2590ae299bd5982799932ad5f726f6c653d76626f786e65743173656375726974792c00"]) [ 1990.456701] audit: type=1400 audit(2000001624.940:63936): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.550462] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1990.608023] audit: type=1400 audit(2000001624.940:63937): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xa00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1990.758019] audit: type=1400 audit(2000001625.030:63938): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1990.971739] audit: type=1400 audit(2000001625.030:63939): avc: denied { map } for pid=9739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.079263] Unknown ioctl 35297 [ 1991.128477] audit: type=1400 audit(2000001625.090:63940): avc: denied { create } for pid=9745 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:25 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) [ 1991.264914] audit: type=1400 audit(2000001625.110:63941): avc: denied { map } for pid=9747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.349771] Unknown ioctl 35297 [ 1991.370990] gfs2: invalid mount option: subjïAª¯âY [ 1991.370990] ♽Y‚y™2­_role=vboxnet1security [ 1991.408053] audit: type=1400 audit(2000001625.110:63942): avc: denied { map } for pid=9747 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1991.438149] gfs2: can't parse mount arguments 04:00:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x22e4, 0x80000) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) connect$can_bcm(r1, &(0x7f0000000180)={0x1d, r2}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:26 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) [ 1991.698560] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfe80000000000000) 04:00:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xd00a}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 04:00:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) [ 1992.725659] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x1000000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:27 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200000) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x58, 0x2, 0x3, 0x0, 0x10, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xe0) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x7, 0x80, 0x2, 0x0, 0x15ba, 0x40000, 0x2, 0x9, 0x5, 0x2, 0x1, 0x1, 0x4, 0xfffffffffffffffc, 0x200, 0x8, 0x20, 0x6, 0x8, 0x7, 0x0, 0x6, 0x0, 0xfffffffffffffffa, 0x1, 0xff, 0x1295800000000, 0x3, 0x1, 0x117c4656, 0x5, 0xffff, 0x9, 0x34b, 0x3, 0x0, 0xb3, 0x5, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x4f13, 0x40, 0x7, 0x5}, r1, 0xc, r0, 0x1) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xc0fe) 04:00:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x408, 0x2000) [ 1993.749528] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x480}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) accept$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4000000000000000) 04:00:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x40e, 0x2000) 04:00:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) openat(r1, &(0x7f0000000340)='./file0\x00', 0x20000, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="b7a1a76a6d87b89166643d", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030300000000030303034303030302c757365725f69643d747c032c3c9945", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x19, 0x220000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x100000000, 0x1}, &(0x7f0000000140)=0x8) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x8, 0x2001) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000400)={r3, 0x8, 0x809}, 0x0) read$FUSE(r0, &(0x7f0000001580), 0x100000324) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1994.890520] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x7a}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1995.230766] kauditd_printk_skb: 161 callbacks suppressed [ 1995.230781] audit: type=1400 audit(2000001629.900:64104): avc: denied { map } for pid=9833 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x1100000000000000) 04:00:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[0x4, 0x2, 0x7, 0x3b, 0x80000000, 0x3]}) [ 1995.348012] audit: type=1400 audit(2000001629.950:64105): avc: denied { map } for pid=9833 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0xf, 0x2000) 04:00:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1995.520944] audit: type=1400 audit(2000001629.950:64106): avc: denied { map } for pid=9833 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1995.695879] audit: type=1400 audit(2000001629.950:64107): avc: denied { map } for pid=9833 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1995.824756] audit: type=1400 audit(2000001630.000:64108): avc: denied { map } for pid=9833 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4, &(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRES32=r0]) ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x10801, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 1995.867015] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x9000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 1996.028075] audit: type=1400 audit(2000001630.020:64109): avc: denied { map } for pid=9836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1996.207996] audit: type=1400 audit(2000001630.020:64110): avc: denied { map } for pid=9836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1996.349231] audit: type=1400 audit(2000001630.050:64111): avc: denied { map } for pid=9833 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x0, 0x4) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x40a, 0x2000) [ 1996.548925] audit: type=1400 audit(2000001630.050:64112): avc: denied { map } for pid=9836 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xfc000000) [ 1996.683619] audit: type=1400 audit(2000001630.060:64113): avc: denied { map } for pid=9836 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 1996.973407] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0xffffffffffffffff, 0x5, {0xc7b}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0x3ff, 0x20, 0x401, 0x9}}) r2 = fcntl$getown(r1, 0x9) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000002580)) fcntl$getownex(r1, 0x10, &(0x7f00000025c0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002600)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000002700)=0xe8) r7 = getegid() sendmsg$unix(r0, &(0x7f0000002800)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)="6d15ffc6666ea206f43b0fe9b170e85077057d2c5b95f9e9f838dcfba7833bef1f3d678b89412e2a0a57fbcc0a4c9397a50b2da7ad5c5cbe97863cfa4f2303e82ba13a5ea49df079f9262c6438", 0x4d}, {&(0x7f0000001580)="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", 0x1000}], 0x3, &(0x7f0000002740)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x98, 0x20000000}, 0x1) write$FUSE_INIT(r1, &(0x7f0000002840)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4c00}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0xa, 0x2000) 04:00:32 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x2, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf4010000) [ 1997.762211] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1997.936145] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) close(r0) 04:00:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x24, 0x2000) 04:00:33 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x125040, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000200)={0x2, 0x6}, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x880, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000180)=""/68) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x75c, 0x0, 0x0, 0xfffffffffffffffb}) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000240)=0x8, 0x4) 04:00:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe803) [ 1998.928983] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1999.002545] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x7400000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x11) 04:00:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x7, 0x2000) 04:00:34 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="24726f6f746d6f6465725f69643d002c793016d376a0e78a7c095be921f6a7ae692b3f7ca437d359d62381ec9a5ec1654c6810cb50dbdf4c6c164dc471fde1061bfeadf337681ab4a55a7867f496938948c17ff774ff4c8752e4d95df4aa7c1b147c4392f65f4265ee17859ed2c0a847790000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c5a3f832cfaacbcf121a2af247e90"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) r1 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x800, 0x1ab) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r2, 0x208, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0xd4) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='tracefs\x00', 0x10000, &(0x7f0000000340)='/dev/fuse\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000500)={0x10, 0x0, 0x5}, 0x10) write$FUSE_GETXATTR(r0, &(0x7f0000000400)={0x18, 0xfffffffffffffffe, 0x4, {0x80}}, 0x18) 04:00:34 executing program 5: lstat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) vmsplice(r1, &(0x7f0000000500)=[{&(0x7f0000000480)="2d8d2c58073e534db1cdbe99", 0xc}], 0x1, 0x1) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgid(0x0) mlockall(0x6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) wait4(r3, &(0x7f0000000000), 0x2, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/201) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000380)={{0x2, 0x4e24, @local}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x0, {0x2, 0x4e22, @multicast1}, 'syz_tun\x00'}) futex(&(0x7f00000004c0)=0x1, 0x8b, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f0000000580), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = msgget(0x2, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x277, 0x4) msgrcv(r5, 0x0, 0x0, 0x1000001, 0x2800) 04:00:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xff03000000000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 2000.238963] kauditd_printk_skb: 174 callbacks suppressed [ 2000.238979] audit: type=1400 audit(2000001634.900:64288): avc: denied { map } for pid=9920 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x11, 0x2000) [ 2000.396728] audit: type=1400 audit(2000001634.910:64289): avc: denied { map } for pid=9922 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xffffffff00000000) 04:00:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 2000.621445] audit: type=1400 audit(2000001634.910:64290): avc: denied { map } for pid=9922 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000100)) [ 2000.826140] audit: type=1400 audit(2000001634.950:64291): avc: denied { map } for pid=9920 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2000.981317] audit: type=1400 audit(2000001634.950:64292): avc: denied { map } for pid=9928 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2001.123498] audit: type=1400 audit(2000001634.950:64293): avc: denied { map } for pid=9928 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2001.296414] audit: type=1400 audit(2000001634.990:64294): avc: denied { map } for pid=9928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2001.363028] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2001.515449] audit: type=1400 audit(2000001634.990:64295): avc: denied { map } for pid=9920 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2001.606509] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xf00000000000000) 04:00:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 2001.731623] audit: type=1400 audit(2000001635.000:64296): avc: denied { map } for pid=9928 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x9effffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x8, 0x2000) 04:00:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001580), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x6}, 0x10) [ 2001.979151] audit: type=1400 audit(2000001635.010:64297): avc: denied { create } for pid=9927 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:00:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000040)=0x13, 0x4) dup2(r1, r0) get_thread_area(&(0x7f0000000080)={0x4b5a, 0x20001000, 0xffffffffffffffff, 0xf5, 0x5, 0x7, 0xfffffffffffffffc, 0x9, 0x6}) msgrcv(0x0, 0x0, 0x0, 0x0, 0xa4a3ad41a879dde0) 04:00:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x6000000) [ 2002.872345] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x2, 0x2000) 04:00:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x6c}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xffffffa9) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x25, 0x2000) 04:00:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x8000000) 04:00:38 executing program 5: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x20, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) 04:00:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xf0ffffff00000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x800) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x407, 0x2000) [ 2005.145257] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3) [ 2005.260296] kauditd_printk_skb: 169 callbacks suppressed [ 2005.260318] audit: type=1400 audit(2000001639.930:64467): avc: denied { write } for pid=10009 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2005.290971] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2005.399195] MINIX-fs: mounting unchecked file system, running fsck is recommended 04:00:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x50000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 2005.444640] audit: type=1400 audit(2000001640.000:64468): avc: denied { create } for pid=10007 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2005.600587] audit: type=1400 audit(2000001640.000:64469): avc: denied { write } for pid=10007 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2005.743817] audit: type=1400 audit(2000001640.090:64470): avc: denied { map } for pid=10020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2005.892661] audit: type=1400 audit(2000001640.160:64471): avc: denied { map } for pid=10020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff"]) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 2006.091406] audit: type=1400 audit(2000001640.220:64472): avc: denied { map } for pid=10020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2006.230338] audit: type=1400 audit(2000001640.220:64473): avc: denied { map } for pid=10020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:40 executing program 5: clock_adjtime(0x0, &(0x7f00000001c0)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x2000000000}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="00000008df6381dbdf2508000004"], 0x1}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x204080c8) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:00:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x409, 0x2000) [ 2006.353405] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2006.398086] audit: type=1400 audit(2000001640.260:64474): avc: denied { map } for pid=10020 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x400000000000000) [ 2006.570047] audit: type=1400 audit(2000001640.310:64475): avc: denied { map } for pid=10020 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x7a000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 2006.819743] minix_free_inode: bit 1 already cleared [ 2006.838096] audit: type=1400 audit(2000001640.310:64476): avc: denied { map } for pid=10020 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2007.504948] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x2, {0x0, 0x6}}, 0x20) read$FUSE(r0, &(0x7f0000000580), 0xefee) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x64000, 0x10) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x24, r2, 0x108, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x4}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4004010) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x406, 0x2000) [ 2007.642541] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x900}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4000000) 04:00:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:42 executing program 5: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$smack_current(r2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) shutdown(r1, 0x1) 04:00:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x6, 0x2000) 04:00:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x60}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4a0cc6d200000000) 04:00:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) getgroups(0x6, &(0x7f00000003c0)=[0xee00, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001580)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@initdev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000540)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x20084, &(0x7f0000001780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@uid_lt={'uid<', r3}}, {@smackfsroot={'smackfsroot', 0x3d, 'fuse\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r4}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x76, 0x37, 0x31, 0x36, 0x3d, 0x63, 0x63], 0x2d, [0x32, 0x36, 0x7d, 0x66], 0x2d, [0x35, 0x37, 0x77, 0x75], 0x2d, [0x63, 0x73, 0x7f, 0x77], 0x2d, [0x61, 0x36, 0x34, 0x33, 0x65, 0x39, 0x0, 0x39]}}}, {@hash='hash'}]}}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSABS20(r6, 0x401845e0, &(0x7f0000000100)={0x9, 0x8, 0x8be, 0x8001, 0x3, 0xfffffffffffffeff}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x9, 0x2000) [ 2009.619251] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 04:00:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x3f00000000000000) 04:00:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) 04:00:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x402, 0x2000) [ 2010.268747] kauditd_printk_skb: 169 callbacks suppressed [ 2010.268762] audit: type=1400 audit(2000001644.943:64637): avc: denied { map } for pid=10094 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2010.397990] audit: type=1400 audit(2000001644.943:64638): avc: denied { map } for pid=10101 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2010.565417] audit: type=1400 audit(2000001644.973:64639): avc: denied { map } for pid=10094 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2010.688600] audit: type=1400 audit(2000001645.023:64640): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xf0ffffffffffff}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f00000000c0)) [ 2010.925160] audit: type=1400 audit(2000001645.023:64641): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2011.119971] audit: type=1400 audit(2000001645.113:64642): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2011.215921] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2011.259347] audit: type=1400 audit(2000001645.113:64643): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0xe8030000) 04:00:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xa000000}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x10, 0x2000) 04:00:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x7f, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 2011.468022] audit: type=1400 audit(2000001645.153:64644): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ax25={{0x3, @rose}, [@netrom, @null, @default, @netrom, @rose, @remote, @null]}, &(0x7f0000000140)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x0, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x1) socket(0x13, 0x0, 0x9) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) [ 2011.592834] audit: type=1400 audit(2000001645.213:64645): avc: denied { map } for pid=10101 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2011.776083] audit: type=1400 audit(2000001645.223:64646): avc: denied { map } for pid=10106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:00:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c, 0x0) [ 2012.279278] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x500}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x3, 0x2000) 04:00:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x800000000000000) 04:00:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x2400000000000}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 2012.932343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2013.210645] openvswitch: netlink: Either Ethernet header or EtherType is required. 04:00:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) getgid() socketpair$unix(0x1, 0xfff7fffffffffffc, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) close(0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000500)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000280)={0xf, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) write(r0, &(0x7f0000000600)="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", 0x200) write$FUSE_OPEN(r0, &(0x7f0000000200)={0x20, 0x0, 0x3}, 0x20) sendfile(r0, r1, 0x0, 0x10000) write$P9_RVERSION(r0, &(0x7f0000000140)={0x13, 0x65, 0xffff, 0x806, 0x6, '9P2000'}, 0x13) 04:00:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0x4c}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x5, 0x2000) 04:00:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x3, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='fuse\x00', 0x20, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@fowner_lt={'fowner<', r3}}, {@fowner_gt={'fowner>', r4}}, {@dont_appraise='dont_appraise'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r5, &(0x7f0000001680), 0xfc9d) write$FUSE_INIT(r5, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) 04:00:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x900000000000000) [ 2013.923221] kasan: CONFIG_KASAN_INLINE enabled [ 2013.965385] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2014.029110] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2014.035381] CPU: 0 PID: 10167 Comm: syz-executor3 Not tainted 4.20.0+ #170 [ 2014.040854] kobject: 'loop4' (0000000054f73ae8): kobject_uevent_env [ 2014.042392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2014.042418] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 2014.042441] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 2014.062680] kobject: 'loop4' (0000000054f73ae8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2014.063405] RSP: 0018:ffff88805d36f4b8 EFLAGS: 00010247 [ 2014.097095] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000c08e000 [ 2014.104384] RDX: 0000000000000000 RSI: ffffffff828774a3 RDI: 0000000000000004 [ 2014.111664] RBP: ffff88805d36fa50 R08: ffff888053078000 R09: ffffed1012baa682 [ 2014.118934] R10: ffffed1012baa682 R11: ffff888095d53413 R12: 0000000000000000 [ 2014.126217] R13: ffff888095d533f0 R14: 0000000000000000 R15: 0000000000000030 [ 2014.133492] FS: 00007fda583b5700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 2014.141722] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2014.147602] CR2: 00000000004ef94c CR3: 0000000094b0c000 CR4: 00000000001406f0 [ 2014.154881] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2014.162154] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2014.166047] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2014.169436] Call Trace: [ 2014.169458] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 2014.169481] ? fuse_dev_read+0x250/0x250 [ 2014.169502] ? mark_held_locks+0x130/0x130 [ 2014.169522] ? futex_wake+0x613/0x760 [ 2014.196942] ? lock_downgrade+0x900/0x900 [ 2014.201103] ? kasan_check_read+0x11/0x20 [ 2014.205065] kobject: 'loop1' (000000008658ccd8): kobject_uevent_env [ 2014.205261] ? print_usage_bug+0xc0/0xc0 [ 2014.215704] ? do_raw_spin_trylock+0x270/0x270 [ 2014.220293] ? print_usage_bug+0xc0/0xc0 [ 2014.224367] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2014.229567] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 2014.234676] ? futex_wake+0x304/0x760 [ 2014.238494] ? graph_lock+0x270/0x270 [ 2014.242303] ? __lock_acquire+0x62f/0x4c20 [ 2014.246537] ? find_held_lock+0x36/0x1c0 [ 2014.250611] ? find_held_lock+0x36/0x1c0 [ 2014.250908] kobject: 'loop1' (000000008658ccd8): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2014.254697] ? __fget+0x4aa/0x740 [ 2014.254732] ? lock_downgrade+0x900/0x900 [ 2014.271767] ? check_preemption_disabled+0x48/0x280 [ 2014.276794] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 2014.281736] ? kasan_check_read+0x11/0x20 [ 2014.285889] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2014.291168] ? rcu_softirq_qs+0x20/0x20 [ 2014.295218] ? __fget+0x4d1/0x740 [ 2014.298678] ? memset+0x31/0x40 [ 2014.301972] fuse_dev_write+0x19a/0x240 [ 2014.305951] ? fuse_dev_splice_write+0xe70/0xe70 [ 2014.310726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2014.316274] ? iov_iter_init+0xe5/0x210 [ 2014.320256] __vfs_write+0x6b8/0x9f0 [ 2014.323976] ? kernel_read+0x120/0x120 [ 2014.327867] ? __might_sleep+0x95/0x190 [ 2014.331852] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2014.337394] ? __inode_security_revalidate+0xd9/0x120 [ 2014.342591] ? selinux_file_permission+0x90/0x540 [ 2014.347444] ? rw_verify_area+0x118/0x360 [ 2014.351605] vfs_write+0x1fc/0x560 [ 2014.355164] ksys_write+0x101/0x260 [ 2014.358825] ? __ia32_sys_read+0xb0/0xb0 [ 2014.362894] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2014.368351] __x64_sys_write+0x73/0xb0 [ 2014.372249] do_syscall_64+0x1b9/0x820 [ 2014.376144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2014.381530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2014.386466] ? trace_hardirqs_on_caller+0x310/0x310 [ 2014.391492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2014.396512] ? recalc_sigpending_tsk+0x180/0x180 [ 2014.401273] ? __switch_to_asm+0x40/0x70 [ 2014.405427] ? __switch_to_asm+0x34/0x70 [ 2014.409498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2014.414350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2014.419552] RIP: 0033:0x4579b9 [ 2014.423215] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2014.442125] RSP: 002b:00007fda583b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2014.449842] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004579b9 [ 2014.457112] RDX: 0000000000000030 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2014.464381] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2014.471648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda583b56d4 04:00:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2, 0x0, 0xa}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 04:00:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0xb, 0x2000) [ 2014.478923] R13: 00000000004c662a R14: 00000000004db700 R15: 00000000ffffffff [ 2014.486214] Modules linked in: 04:00:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x4703000000000000) [ 2014.776330] ---[ end trace 3920a49d852147ef ]--- [ 2014.785267] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 2014.794289] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 2014.816070] RSP: 0018:ffff88805d36f4b8 EFLAGS: 00010247 [ 2014.825104] kobject: '0:48' (0000000064ff3201): kobject_add_internal: parent: 'bdi', set: 'devices' [ 2014.825974] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000c08e000 [ 2014.910400] kobject: '0:48' (0000000064ff3201): kobject_uevent_env 04:00:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x40b, 0x2000) [ 2014.987414] kobject: '0:48' (0000000064ff3201): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 2015.046819] RDX: 0000000000000000 RSI: ffffffff828774a3 RDI: 0000000000000004 [ 2015.085375] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2015.212669] RBP: ffff88805d36fa50 R08: ffff888053078000 R09: ffffed1012baa682 [ 2015.222946] R10: ffffed1012baa682 R11: ffff888095d53413 R12: 0000000000000000 [ 2015.236623] R13: ffff888095d533f0 R14: 0000000000000000 R15: 0000000000000030 [ 2015.246177] FS: 00007fda583b5700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 2015.255514] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2015.272167] kobject: '0:49' (00000000c0e32eba): kobject_add_internal: parent: 'bdi', set: 'devices' [ 2015.277367] CR2: 0000000002466668 CR3: 0000000094b0c000 CR4: 00000000001406e0 [ 2015.339300] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2015.371858] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2015.405370] Kernel panic - not syncing: Fatal exception [ 2015.411709] Kernel Offset: disabled [ 2015.415330] Rebooting in 86400 seconds..