[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 9.519227] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.457257] random: sshd: uninitialized urandom read (32 bytes read) [ 16.796795] audit: type=1400 audit(1544519907.390:6): avc: denied { map } for pid=1745 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 16.832278] random: sshd: uninitialized urandom read (32 bytes read) [ 17.332177] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.106' (ECDSA) to the list of known hosts. [ 23.065452] random: sshd: uninitialized urandom read (32 bytes read) 2018/12/11 09:18:33 fuzzer started [ 23.156247] audit: type=1400 audit(1544519913.750:7): avc: denied { map } for pid=1760 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 24.298512] random: cc1: uninitialized urandom read (8 bytes read) 2018/12/11 09:18:35 dialing manager at 10.128.0.26:33537 2018/12/11 09:18:35 syscalls: 1 2018/12/11 09:18:35 code coverage: enabled 2018/12/11 09:18:35 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2018/12/11 09:18:35 setuid sandbox: enabled 2018/12/11 09:18:35 namespace sandbox: enabled 2018/12/11 09:18:35 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/11 09:18:35 fault injection: CONFIG_FAULT_INJECTION is not enabled 2018/12/11 09:18:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/11 09:18:35 net packet injection: enabled 2018/12/11 09:18:35 net device setup: enabled [ 26.138114] random: crng init done 09:19:48 executing program 0: unshare(0x10100) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1e8, r1, 0x701, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x4, @remote, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x649}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x58}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xac}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7, @mcast1, 0x7f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x20, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @local, 0xac8}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x40000}, 0x5) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000300)=0x401, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f0000000340)='security.SMACK64\x00', &(0x7f0000000380)='ib', 0x2, 0x1) r2 = signalfd(r0, &(0x7f00000003c0)={0x8001}, 0x8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000440)={{0x3, 0x2, 0x1, 0x3, 0x701}, 0xffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000500)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) lchown(&(0x7f00000004c0)='./file0\x00', r5, r7) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$TIOCSCTTY(r3, 0x540e, 0x9) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f00000006c0)={0x8, 0x0, 0x80, 0x4, "01b84f89291b0320845d6f10d0348b9ea7e8cb63480c3e2cb4a0d4d32246d79c"}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000007c0)={r3, &(0x7f0000000700)="c94a429987c351319177fa7c9f3fad1ac0d1967663857c4fb763c929498712298f2d72ab31492a", &(0x7f0000000740)=""/97}, 0x18) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000a00)={&(0x7f0000000880)={0x16c, r8, 0x102, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x104, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x200, 0x0, 0x7e9a90f8, 0x3}, {0x8, 0x1, 0xffffffffffffffff, 0x3f}, {0x76, 0x9, 0x9, 0x1}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x84a}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x483}}, {0x8}}}]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) getgroups(0x0, &(0x7f0000000a80)) r9 = syz_open_procfs$namespace(r6, &(0x7f0000000ac0)='ns/uts\x00') ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000b00)) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000b40)) signalfd4(r9, &(0x7f0000000b80)={0x800}, 0x8, 0x800) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000bc0)={0x7, 0x80000000}) setsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000000c00)="fe853d923b0f95cb1886d4982ebb4616a8c3de48316188d040fdb63adb0edbf854d61953b920e99d2cc60761f76b9108de8359f342795ce99bd043265cbe7023a6c2ca6d51b6240a74862925b76d2d5e5a15f7e05e299a2335b69ccfb2be36c11a3142c7", 0x64) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/zero\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000cc0)={0x20000004}) write$UHID_CREATE2(r10, &(0x7f0000000d00)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xe, 0x3, 0xdc7, 0x6, 0x2, 0x8001, "e324a5e3c9ccc020ec2e185173e3"}, 0x126) write$P9_RFLUSH(r3, &(0x7f0000000e40)={0x7, 0x6d, 0x1}, 0x7) 09:19:48 executing program 5: socket$unix(0x1, 0x1, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x4) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7, 0x20, 0x2, 0x3}]}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x4, 0x8000, 0xc2c6, 0xfffffffffffffffc}, {0x1c1e, 0x0, 0x800, 0x9}, {0xac, 0x3, 0x1, 0x7fffffff}, {0x9, 0x800, 0x1, 0x8}, {0x2, 0x1000, 0x19acfb41, 0xd3}, {0xfffffffffffffffe, 0x1636, 0x3dd4, 0x3}, {0x1, 0x2, 0x101, 0x80000000}]}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) getpgrp(r2) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000200)=""/206, &(0x7f0000000300)=0xce) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syncfs(r1) write$P9_RSTATFS(r0, &(0x7f0000000340)={0x43, 0x9, 0x2, {0x7, 0x0, 0x1f, 0x5, 0x6, 0x9d99, 0xfff, 0xffffffffffffffe9, 0x3}}, 0x43) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) mount(&(0x7f00000003c0)=@sr0='/dev/sr0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='rpc_pipefs\x00', 0x2, &(0x7f0000000480)='security$\\[keyring\x00') r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000500)=0x1a, 0x4) openat$urandom(0xffffffffffffff9c, &(0x7f0000000540)='/dev/urandom\x00', 0x200000, 0x0) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000580)={0xef8, 0x4, 0x800, 0xe8f, 0x100000001, 0x7}) connect$netlink(r0, &(0x7f00000005c0)=@kern={0x10, 0x0, 0x0, 0x30080000}, 0xc) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000600)) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000640)={{0xa, 0x4e22, 0x200, @ipv4={[], [], @empty}, 0x80}, {0xa, 0x4e23, 0x9, @loopback}, 0x7, [0x5, 0x0, 0x9, 0x3f, 0x5, 0x5, 0x1000, 0x6]}, 0x5c) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000006c0)) write$P9_RWRITE(r0, &(0x7f0000000700)={0xb, 0x77, 0x2, 0x9}, 0xb) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000740)={0x8, 0x9}) ptrace$peekuser(0x3, r2, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000780)={0x0, @loopback, @local}, &(0x7f00000007c0)=0xc) recvfrom$unix(r3, &(0x7f0000000800)=""/229, 0xe5, 0x2, &(0x7f0000000900)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000980)={0x6, 0x7, 0x3, 0x9, 0xfffffffffffffff9}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000009c0)=r3, 0x4) write$P9_RRENAMEAT(r0, &(0x7f0000000a00)={0x7, 0x4b, 0x1}, 0x7) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000a40)=0x3, 0x4) 09:19:48 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e23, @multicast1}}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0x5, 0x5, 0x3f}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) epoll_wait(r0, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0x1323) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0xffffffffffffffff) sched_yield() r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = getpgrp(0x0) fcntl$lock(r2, 0x27, &(0x7f0000000200)={0x1, 0x3, 0x7, 0xffffffff, r3}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000240)={0x5, 0xcac, 0x4}) getsockname(r2, &(0x7f00000002c0)=@hci={0x1f, 0x0}, &(0x7f0000000340)=0x80) sendmsg$nl_xfrm(r2, &(0x7f00000016c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x24}, 0xc, &(0x7f0000001680)={&(0x7f0000000380)=@acquire={0x12e8, 0x17, 0x400, 0x70bd26, 0x25dfdbfd, {{@in6=@remote, 0x4d2, 0xff}, @in6=@mcast2, {@in=@empty, @in=@broadcast, 0x4e22, 0x4, 0x4e20, 0x2, 0x2, 0x80, 0x80, 0x0, 0x0, r1}, {{@in6=@ipv4={[], [], @remote}, @in6, 0x4e21, 0x5, 0x4e20, 0x0, 0x2, 0x80, 0x20, 0x62, r4, r1}, {0x7, 0x74, 0x1, 0x3ff, 0x5, 0x9, 0x8000000000, 0xf9}, {0x5, 0x0, 0x2f53f32d}, 0x5, 0x6e6bbe, 0x2, 0x0, 0x3, 0x3}, 0x8, 0x200, 0x7, 0x70bd29}, [@lastused={0xc, 0xf, 0x6e9}, @migrate={0x88, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6=@ipv4={[], [], @empty}, 0x32, 0x4, 0x0, 0x0, 0x2, 0xa}, {@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x19}, 0xff, 0x7, 0x0, 0x0, 0xa, 0xa}, {@in6, @in6=@dev={0xfe, 0x80, [], 0xf}, 0xff, 0x0, 0x0, 0x3502, 0x2, 0xa}]}, @ipv6_hthresh={0x8, 0x4, {0x66, 0x4f}}, @mark={0xc, 0x15, {0x35075a, 0x9}}, @algo_comp={0x1048, 0x3, {{'lzjh\x00'}, 0x8000, "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"}}, @mark={0xc, 0x15, {0x35075c, 0x3}}, @algo_auth={0xc4, 0x1, {{'sm3-generic\x00'}, 0x3d8, "879e76a01d315f16b3940c9fa2dd55dd13fe0ff12a2ef609007567b9db79b98d7f6aad749a5d0204f51d52c2e51d890ec9786dc5382d1334a0fadf1bf7a170008fbd71dd40e50184ec5b2c6200ca397cbbb0a9d2544f3e012faaa120ba71fadbe8647552ea26241484cec2fa51e242c162f03c2736b52b642ca07c"}}]}, 0x12e8}, 0x1, 0x0, 0x0, 0x40c0}, 0x8040) connect$inet6(r2, &(0x7f0000001700)={0xa, 0x4e21, 0x101, @local, 0x6}, 0x1c) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000001740)={0x10000, 0x0, 0x1, 0x0, 0x0, [{r0, 0x0, 0x6}]}) add_key(&(0x7f0000001780)='dns_resolver\x00', &(0x7f00000017c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ptrace$setopts(0x4206, r3, 0x2, 0x2) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000001800)={0x7, 0x9d5, 0x4}) fsetxattr$security_selinux(r2, &(0x7f0000001840)='security.selinux\x00', &(0x7f0000001880)='system_u:object_r:usbmon_device_t:s0\x00', 0x25, 0xb2c83b7f4a946f92) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000001900)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000019c0)={&(0x7f00000018c0), 0xc, &(0x7f0000001980)={&(0x7f0000001940)={0x38, r5, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x1c, 0x18, {0x9, @bearer=@l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}}}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x80) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x1c, r5, 0x10, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4) openat$cgroup_ro(r0, &(0x7f0000001b00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sched_yield() prctl$PR_SET_TIMERSLACK(0x1d, 0x4) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000001b40), &(0x7f0000001b80)=0x8) 09:19:48 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000000)='@eth1nodev\\^\x00', 0x0}, 0x30) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000100)=""/51) sendto$inet6(r2, &(0x7f0000000140)="67818ffb6cd81c3ed3b1761773", 0xd, 0x4000000, &(0x7f0000000180)={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000001c0)={0x65, 0x2, 0x7, 0x78, 0x4}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x7fff, 0x0, "ca683f1db809297a46e7d7d26420ea6f2dc8f99eee9f96cdd44a8eb2cfb57ee8f738059149f84b9d6586906ad2966b8af5e9133c32e60ccb5dfe0e60d66e0377561e99e49261359cd94f2dd568bd6f2f"}, 0xd8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) setpriority(0x0, r0, 0x5c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r3, r4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000340)='veth0_to_bridge\x00', 0x10) r7 = add_key(&(0x7f0000000440)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="45683f9ed76b0cbb58b3116f688d1bd2d87639342443e0126090bd1004c3132c8df558446a501029a7761b118e4f", 0x2e, 0xfffffffffffffff9) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="247c8f3c36d8792c6c9e9eb567f074d63e00ce9f72e5c50a3641d7ace6d06aaa6ecf4d509e57ad79f9e86d9ad0107bf68e20e9904b9cafab3b53e0de", 0x3c, r7) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000500)) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000700)={@mcast1, 0x0}, &(0x7f0000000740)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) accept$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) getsockname$packet(r6, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001dc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000001e00)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000001f40)={@rand_addr, @local, 0x0}, &(0x7f0000001f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000001fc0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000020c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000023c0)={'team0\x00', 0x0}) accept4$packet(r6, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002440)=0x14, 0x0) getsockopt$inet_mreqn(r6, 0x0, 0x24, &(0x7f00000025c0)={@remote, @rand_addr, 0x0}, &(0x7f0000002600)=0xc) recvmmsg(r3, &(0x7f00000063c0)=[{{&(0x7f0000002640)=@nfc, 0x80, &(0x7f0000003880)=[{&(0x7f00000026c0)=""/187, 0xbb}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/225, 0xe1}], 0x3, &(0x7f00000038c0)=""/49, 0x31}, 0x35}, {{&(0x7f0000003900)=@nl, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003980)=""/210, 0xd2}, {&(0x7f0000003a80)=""/78, 0x4e}, {&(0x7f0000003b00)=""/233, 0xe9}], 0x3, &(0x7f0000003c40)=""/215, 0xd7}, 0x5}, {{&(0x7f0000003d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000003dc0)=""/109, 0x6d}, {&(0x7f0000003e40)=""/231, 0xe7}, {&(0x7f0000003f40)=""/105, 0x69}], 0x3, &(0x7f0000004000)=""/128, 0x80}, 0x7}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000004080)=""/172, 0xac}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/146, 0x92}, {&(0x7f0000005200)=""/136, 0x88}, {&(0x7f00000052c0)=""/63, 0x3f}, {&(0x7f0000005300)=""/226, 0xe2}, {&(0x7f0000005400)=""/54, 0x36}, {&(0x7f0000005440)=""/56, 0x38}], 0x8, &(0x7f0000005500)=""/44, 0x2c}, 0xede7}, {{0x0, 0x0, &(0x7f00000059c0)=[{&(0x7f0000005540)=""/216, 0xd8}, {&(0x7f0000005640)=""/96, 0x60}, {&(0x7f00000056c0)=""/42, 0x2a}, {&(0x7f0000005700)=""/6, 0x6}, {&(0x7f0000005740)=""/148, 0x94}, {&(0x7f0000005800)=""/238, 0xee}, {&(0x7f0000005900)=""/160, 0xa0}], 0x7}, 0x80}, {{&(0x7f0000005a40)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005ac0)=""/208, 0xd0}], 0x1, &(0x7f0000005c00)=""/121, 0x79}}, {{&(0x7f0000005c80)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000006140)=[{&(0x7f0000005d00)=""/221, 0xdd}, {&(0x7f0000005e00)=""/86, 0x56}, {&(0x7f0000005e80)=""/147, 0x93}, {&(0x7f0000005f40)=""/118, 0x76}, {&(0x7f0000005fc0)=""/113, 0x71}, {&(0x7f0000006040)=""/156, 0x9c}, {&(0x7f0000006100)=""/37, 0x25}], 0x7, &(0x7f00000061c0)=""/132, 0x84}, 0xe07c}, {{0x0, 0x0, &(0x7f0000006340)=[{&(0x7f0000006280)=""/146, 0x92}], 0x1, &(0x7f0000006380)=""/37, 0x25}, 0x3}], 0x8, 0x2, &(0x7f00000065c0)={0x77359400}) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000006600)={0x0, @loopback, @multicast2}, &(0x7f0000006640)=0xc) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000006700)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000006800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000006880)={'team0\x00', 0x0}) getsockname$packet(r3, &(0x7f0000006f00)={0x11, 0x0, 0x0}, &(0x7f0000006f40)=0x14) accept$packet(r3, &(0x7f0000007340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007380)=0x14) recvmmsg(r6, &(0x7f000000a4c0)=[{{&(0x7f00000073c0)=@ipx, 0x80, &(0x7f0000008a40)=[{&(0x7f0000007440)=""/76, 0x4c}, {&(0x7f00000074c0)=""/228, 0xe4}, {&(0x7f00000075c0)=""/4096, 0x1000}, {&(0x7f00000085c0)=""/250, 0xfa}, {&(0x7f00000086c0)=""/47, 0x2f}, {&(0x7f0000008700)=""/195, 0xc3}, {&(0x7f0000008800)=""/206, 0xce}, {&(0x7f0000008900)=""/196, 0xc4}, {&(0x7f0000008a00)=""/23, 0x17}], 0x9}, 0x65}, {{&(0x7f0000008b00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000009e00)=[{&(0x7f0000008b80)=""/5, 0x5}, {&(0x7f0000008bc0)=""/220, 0xdc}, {&(0x7f0000008cc0)=""/29, 0x1d}, {&(0x7f0000008d00)=""/4096, 0x1000}, {&(0x7f0000009d00)=""/60, 0x3c}, {&(0x7f0000009d40)=""/153, 0x99}], 0x6, &(0x7f0000009e80)=""/35, 0x23}, 0x6}, {{&(0x7f0000009ec0)=@ipx, 0x80, &(0x7f000000a0c0)=[{&(0x7f0000009f40)=""/122, 0x7a}, {&(0x7f0000009fc0)=""/111, 0x6f}, {&(0x7f000000a040)=""/114, 0x72}], 0x3, &(0x7f000000a100)=""/52, 0x34}, 0x8}, {{&(0x7f000000a140)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f000000a480)=[{&(0x7f000000a1c0)}, {&(0x7f000000a200)=""/214, 0xd6}, {&(0x7f000000a300)=""/231, 0xe7}, {&(0x7f000000a400)=""/68, 0x44}], 0x4}, 0x20}], 0x4, 0x2003, &(0x7f000000a5c0)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f000000a6c0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f000000a740)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f000000a840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f000000aa00)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f000000ab00)=0xe8) getpeername$packet(r3, &(0x7f000000ac80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000acc0)=0x14) getsockname$packet(r4, &(0x7f000000c580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000c5c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f000000c600)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f000000c640)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f000000c740)=0xe8) getpeername$packet(r6, &(0x7f000000d7c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000d800)=0x14) getsockname$packet(r3, &(0x7f000000d840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000d880)=0x14) accept4$packet(r3, &(0x7f000000ddc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000de00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f000000de40)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f000000df40)=0xe8) getsockname$packet(r3, &(0x7f000000df80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000dfc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f000000ea80)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8010000}, 0xc, &(0x7f000000ea40)={&(0x7f000000e000)={0xa2c, r8, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r9}, {0x1fc, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xffff, 0x5fd5, 0x0, 0x5}, {0xe3, 0x7, 0xffffffff, 0x5}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x7, 0x9, 0x5}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0xd8, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x6, 0x80000001, 0x0, 0x4}, {0x8, 0xe4a, 0x100000000, 0x8}, {0x2, 0x9, 0x2e9c, 0x467}, {0x1000, 0x938, 0x6, 0x4}, {0x5, 0x5, 0x4, 0x2ef48d3d}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xb9}}}]}}, {{0x8, 0x1, r17}, {0xf4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xf2d2}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x174, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x94ff}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xc0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r29}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}]}}, {{0x8, 0x1, r31}, {0x1f0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2f3}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r33}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r35}, {0xf0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r36}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r37}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r38}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r39}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0xa2c}, 0x1, 0x0, 0x0, 0x804}, 0x4) 09:19:48 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1a0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000040)={{0x87, @local, 0x4e22, 0x0, 'fo\x00', 0x37, 0x5, 0x3b}, {@multicast2, 0x4e21, 0x4, 0x1, 0x609, 0x1}}, 0x44) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) mount(&(0x7f0000000100)=@nullb='/dev/nullb0\x00', &(0x7f0000000140)='.\x00', &(0x7f0000000180)='openpromfs\x00', 0x1000000, &(0x7f00000001c0)='fo\x00') ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000200)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)={'security\x00', 0x7f, "e2dd31df0d29732a71319af23a971e1af35edfb657f574b9a076e6a9fa5aea7d47e6ea5024abbd9b0b3f2d7a9dc44146e5f3d1ba7335ec1efffc936093df0f308d8944d65fc0851215dc419d97eee98eeefcf246723cd9a62905fa64316d80ebe9bc71f3164c60b5eb8f40cb6919c0582935982bc9c32c0606fb026505300d"}, &(0x7f0000000300)=0xa3) removexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@known='com.apple.FinderInfo\x00') rmdir(&(0x7f00000003c0)='./file0\x00') connect$inet(r0, &(0x7f0000000400)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') r1 = getpid() close(r0) r2 = creat(&(0x7f00000004c0)='./file0\x00', 0x8a2b385c50c8a9c5) getrlimit(0xf, &(0x7f0000000500)) r3 = accept$unix(r0, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) utimensat(r2, &(0x7f0000000600)='./file1\x00', &(0x7f0000000680)={{0x77359400}, {r4, r5/1000+10000}}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000006c0)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000700)=0x7b7b24dd, 0x4) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x200c00, 0x0) write$selinux_create(r6, &(0x7f0000000780)=@access={'system_u:object_r:clock_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x80000001}, 0x48) fcntl$setflags(r3, 0x2, 0x1) flistxattr(r6, &(0x7f0000000800)=""/36, 0x24) ptrace$getsig(0x4202, r1, 0x7, &(0x7f0000000840)) mkdir(&(0x7f00000008c0)='./file1\x00', 0x88) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000900)={0xc140, 0x8, 0x3, 0x6, 0x2, 0x2, 0x135}) write$selinux_attr(r0, &(0x7f0000000940)='system_u:object_r:ppp_device_t:s0\x00', 0x22) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000009c0)={&(0x7f0000000980)='./file0\x00', r2}, 0x10) 09:19:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xff}, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x34, 0x4) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x24, 0x1200) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)=0x0) ptrace$getregset(0x4204, r2, 0x201, &(0x7f0000000400)={&(0x7f0000000380)=""/68, 0x44}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000440)={0x9, 0x10001, 0x1}) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000480)) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000004c0)={0xfffffffffffffffe, {{0x2, 0x4e22, @loopback}}}, 0x88) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000580)={@local}, &(0x7f00000005c0)=0x14) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000640)={r3, r4+30000000}, &(0x7f0000000680)) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000006c0)={0x1ff, 0xffffffff7fffffff, 0x7, 0x7fff, 0x7fff, 0x100000000}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000700)="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") write$selinux_attr(r1, &(0x7f0000000800)='system_u:object_r:systemd_logger_exec_t:s0\x00', 0x2b) write$binfmt_misc(r0, &(0x7f0000000840)={'syz1', "8352f76a9bee003d8e28033f2dad472c35e60eebe68cdf5ef73a5c7457d7b09119081ded3a15d514049662b2d4495b05493dd39dbfaae59cb0f718bf3aa705b6c5cb7d0383182f9dfccbf459e5c0744c265f6f"}, 0x57) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000008c0)=0x101) getdents64(r1, &(0x7f0000000900)=""/205, 0xcd) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000a00)={0x6, 0x9, 0xd1c2}) getsockopt(r0, 0x4, 0xa, &(0x7f0000000a40)=""/229, &(0x7f0000000b40)=0xe5) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000b80)) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000bc0)="6e3e4ebd38f71b9351c34a55854bc2b3bf79744804532b22c491e0a71d6ccfbcbe65c30c15373d511562d037c4f4370ffd4baf221546aae0cd2e2e1d8d57783242a32ac2ca9f6f80d3ba9943a45bd7098e863a2c8d40108860e0c0bc38d23263ca9630d03d048eea048081972ad0481e9be18c1cec4e6053c3287d009a1d485a66fc60cc1f8d086933199903a22b7e22fb1f946ffe742b2baa2af6a4959c04f1d4c3efa1c69fa10659878863f4fa", 0xae) openat$ppp(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/ppp\x00', 0x80, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000cc0)=0x3f) chroot(&(0x7f0000000d00)='./file0\x00') [ 97.745469] audit: type=1400 audit(1544519988.340:8): avc: denied { map } for pid=1760 comm="syz-fuzzer" path="/root/syzkaller-shm742256517" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 97.781686] audit: type=1400 audit(1544519988.380:9): avc: denied { map } for pid=1817 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 09:19:57 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) chroot(&(0x7f0000000140)='./file0\x00') symlink(&(0x7f00000003c0)='..', &(0x7f0000000440)='./file0\x00') umount2(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000280)="8000000000020000faffff0200000000000000000038ea04040000000100000025400000104008080002008a00000000655ebe6c0000ffff53ef4bb626cd9fe867189c05912769e1e45b874dfd079a5efa7974a2adf2dda8086ab512ef68a07eff", 0x61, 0x400}], 0xc803, 0x0) [ 106.800570] audit: type=1400 audit(1544519997.400:10): avc: denied { create } for pid=4457 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.828954] audit: type=1400 audit(1544519997.400:11): avc: denied { write } for pid=4457 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.852733] audit: type=1400 audit(1544519997.400:12): avc: denied { read } for pid=4457 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.889455] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (29) [ 106.897905] EXT4-fs (loop1): couldn't mount as ext3 due to feature incompatibilities 09:19:57 executing program 1: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x9, &(0x7f0000000340)=""/4096, 0x1000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x84000, 0x0) 09:19:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) write(r1, &(0x7f0000000480)="2400000058001f00ff03f4f9002304000a04f51108000100020100020800028001c9a800", 0x24) fcntl$setstatus(r0, 0x4, 0x6000) 09:19:57 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) recvmmsg(0xffffffffffffffff, &(0x7f0000004540), 0x0, 0x0, &(0x7f0000004640)={0x0, 0x989680}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) exit(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x23d) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="0c0004001301000000000e000c00040000ffffffffffff00080001000000000180000000090000ff0075ee677c54f1bf7bbdad91693867d84061feca7645548e7ee93c00bcdabec50c7d6a9c770a6b8761419f37c86d1255d93d5697f1c2bc62583588e8fd120ab947acc59e7ddc1764325c29244f32141c087f72f2f0ca4d162edd0a6b2bc8e8749ac2dc9c0600000096765f9cbde2f959318ffb671467eafd723e9aed443745abed7c297f74ab89f3ddbb66f25e3e68ba4000bd009479ff3757e1d1b66f5048691cc7dacb70f765e70e402862c91f83808a44ac903d33cc4894a9448982e5a75edf84a00b3e8cd2f765d2dd3726443e15fd"], 0x1}}, 0x40095) getsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r4 = getpgid(0xffffffffffffffff) r5 = gettid() setpgid(r4, r5) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) ioctl$EVIOCGEFFECTS(r6, 0x80044584, &(0x7f0000000040)=""/252) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x40000, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLCREATE(r7, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x80, 0x0, 0x2}}}, 0x18) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x200000005d) read(r1, &(0x7f00000000c0)=""/11, 0xb) syz_open_pts(r7, 0x2) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="10db029a580000002000000000000000"], 0x1, 0x0) [ 106.990867] audit: type=1400 audit(1544519997.590:13): avc: denied { syslog } for pid=4474 comm="syz-executor1" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 107.090024] hrtimer: interrupt took 26735 ns 09:19:57 executing program 0: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1c) socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005200), 0x0, 0x0, &(0x7f0000005440)) mlockall(0x5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000001080)=0x5) r3 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r4, 0x0) getsockname$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000280)=0x6e) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) [ 107.191385] audit: type=1400 audit(1544519997.790:14): avc: denied { map } for pid=4497 comm="syz-executor0" path="/dev/binder0" dev="devtmpfs" ino=1090 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 107.218844] audit: type=1400 audit(1544519997.810:15): avc: denied { set_context_mgr } for pid=4497 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 107.230423] binder: 4497:4498 ERROR: BC_REGISTER_LOOPER called without request [ 107.230518] binder: 4497:4498 ioctl c0306201 0 returned -14 09:19:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r2, &(0x7f0000000080)='/', 0x1, 0x0) readv(r1, &(0x7f0000001740)=[{0x0}, {&(0x7f00000011c0)=""/54, 0x36}], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x27) sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x2c8, 0x11, 0x100, 0x70bd2d, 0x25dfdbfd, {0x1f}, [@generic="d056796dc2a6a5d883ccaf71710de201015d1b4b2c223d9b4edb154e21e99c9c03aba1f15f8e4b6d3507bf66a72772c829945d6349a1d43a574f8300d9e6d90531133040838e1eefb00be9772689cf5fc2bb25921f1a6a9a2d7a3f0fa3f8324ec50a6874eba9a2c8", @typed={0x8, 0x67, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @generic="5d0b6774de25944c441d2207adc45f1b71e18acffbc504d4e93d13e63e32271a17060169244b5a3d3994391f0524ea79f621c1c81b46e0153143ebe9d88c8cd61f833e060fd65d76c0ea9cf18cc0b92b579b9d03d72f61c810cf10885156682092b9f14f9d56091d6e0df7d6eea10b9b6a83ebc470f990dce3d08a36a83168c8ab60951e18900a1b9813d00549ed53cd63fa47", @generic="ae01c604bce44fa4c9160a4387d7a5620357aba4c6b16ea17ab813eaee5cee88a144a16bc90a778fe892b83f9f8185b788edad73d3879713397ccb81ce3173e6a8459fb57dea2482a53b498f9afd564fb99a620e8cc61ee345d6ee200759be62a40ecbb12e5a9d7900ff767e81b23d99d8be7f845eb5c51e14407f53a563eed4aa1edbba60e9c0dd74d43b1f220d548ff1a978feedd3acbc09c2f9afe967957d6d01fef27ef88dbd3f7d2c14caebad2c5445ec9d99f7de46c59ef1ac791ba6", @generic, @generic="d616b6a1ad8efccda4b048341f6ab22ff8b87ca9ef89aa36bfeb6b4fd011a57bf9f0b4885e696e3b6e441ef061cd0d9d2294f548c8a013b2d0", @generic="4634ad81a2ace34b5aad4925d9bf6436fa0b8a916be39eaf55694b475f6d6cd39205fe70fb7d35166c9849ae468679b405890e77d653c868a34acbf1309d6ee2bf547741d9fe8591fbdf4239ed9a443c21b2625c22c2a84f54adba9c7dff57add5e68f30c9626cbf5b251009a4f5c10d46ff2a4079c7d381c0661da5f47a672d3522c82533ef1c6e9741593a7f6820e7db5f5e487fd870e95d4c61a8f26c174b163b9718586eda3748d29da81bb55a87d676ea9c20c0"]}, 0x2c8}, 0x1, 0x0, 0x0, 0x20040810}, 0x20008000) 09:19:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x394}}], 0x1, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x200, 0x0) getsockopt$inet6_int(r0, 0x29, 0xdf, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cgroup\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) wait4(r2, &(0x7f0000000080), 0x40000008, &(0x7f00000000c0)) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 09:19:58 executing program 2: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000028ff0)={0x0, 0x0}) 09:19:58 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001080)='/dev/null\x00', 0x80080, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f56ddd3d52610001000000000000fe0012ff00", 0x27) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/4096) [ 107.650654] audit: type=1400 audit(1544519998.250:16): avc: denied { map } for pid=4508 comm="syz-executor5" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=10111 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 09:19:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffe) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x100000001}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x26) [ 107.703005] audit: type=1400 audit(1544519998.300:17): avc: denied { create } for pid=4529 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:19:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') read(r0, &(0x7f0000002640)=""/4096, 0x1000) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xffffffffffffff8b) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x80000001}, 0x28, 0x2) readahead(r0, 0x7fff, 0x1000) [ 107.756115] audit: type=1400 audit(1544519998.330:18): avc: denied { write } for pid=4529 comm="syz-executor2" path="socket:[10288]" dev="sockfs" ino=10288 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 107.791527] audit: type=1400 audit(1544519998.350:19): avc: denied { setattr } for pid=4546 comm="syz-executor3" name="loginuid" dev="proc" ino=10170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 107.979061] binder: BINDER_SET_CONTEXT_MGR already set [ 107.984565] binder: 4497:4566 ioctl 40046207 0 returned -16 [ 107.993402] binder: 4497:4564 ERROR: BC_REGISTER_LOOPER called without request [ 107.993407] binder: 4497:4565 ioctl c0306201 0 returned -14 09:19:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x7, 0x408, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x4}, 0x1804, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000010005fba000082f9a7c1a6eb77ba3ab725733cc292022bc385b7ee3cb2bd00000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) write$tun(r1, &(0x7f0000000400)={@void, @val={0x1, 0x0, 0x6}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0x4a) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_proto_private(r3, 0x89ee, &(0x7f0000000300)="94cce60a3fa52030fb681574ff000f4ee08bbb2a8434f2a3690c4aff5ec21d46a16111b916dc3075fbfb2c303846787731bb0e7774c278c90e32c52bc89e5354c493c53cef1cde80a19a1164f8e2090e7035b030d288e447aa8737b7c6629805d903708d5b1423bacd35a3eff96d47b835e6ffff9ca83b94f3d8ee5539f3619797840b91df1534fb8e9b26b215377855") r4 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001500150400000000000000000a000000", @ANYRES32=r5, @ANYBLOB="14000200ff020000000000000000000000000001"], 0x2c}}, 0x0) 09:19:59 executing program 5: r0 = gettid() waitid(0x2, r0, &(0x7f0000000000), 0x41000002, &(0x7f0000000040)) r1 = getpgid(r0) sched_setparam(r1, &(0x7f0000000100)=0x400) 09:19:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x2, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) fcntl$dupfd(r0, 0x406, r0) 09:19:59 executing program 3: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000050d, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) write$binfmt_aout(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB="cc000568ab0000000902000001010000ce02000006000000000000000000000088f4b7bae2b308a83ead94f0fda61c30ba76054be64ed5ae1e261b9cb8d81f78322ad0a6db8b9c02f8674ecf7e4df332601c5f58b8aa8c59502f31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000780000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046907ad7526c69aef83b070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ee9fed34943d4ebf97478e00000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000036196cc3e3797bb4ded288646e1fe6ce00919d1e5b2e99b84c1a63af677b26838ac77035cbe9f2d44dc4987467fd279268395034671540d33a5a7b0de4201751bfacdcdb5fc44f0eca1b94986d680fd2009446c91a3af2641dc4"], 0xa5b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ptrace$cont(0x7, r1, 0x3, 0x663) ptrace$pokeuser(0x6, r1, 0x4, 0x9) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) tkill(r1, 0x0) ptrace$cont(0x9, 0x0, 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000200)=0xb239, 0x8) prctl$PR_SET_DUMPABLE(0x4, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0xd, 0x0, {{0x0, 0x0, 0x5}}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000180), 0x4) ptrace$cont(0x21, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 09:19:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, r1, 0x0) r3 = dup(r2) write(r3, &(0x7f0000000140)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) 09:19:59 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) preadv(r0, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/133, 0x85}], 0xffffffffffffe3f, 0x0) socketpair(0x17, 0x803, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x20, r2, 0x300, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x9020941c64de0c21}, 0x4040004) delete_module(&(0x7f0000000000)='proc\x00', 0x800) 09:19:59 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x40000, &(0x7f0000000040)="63660fa2f64a4cfd08202d47ca", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)="be420f5a9ae5b67789419ffcd55f9c89d080ef830e1f40175698d614451f07bc901303e0ea0ac1a8897bd2247d8bc65253f4f6265c74ac484603266e46abc68cbe5998349242df03ae5879") getsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000d7f000), &(0x7f0000000000)=0x24c) 09:19:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x15, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x80}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r2, 0x0, 0x4c, 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x3, 0x19) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) signalfd4(r1, &(0x7f0000000240), 0x8, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000003c0)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000300)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000280)=0xffff, 0x4) setsockopt$inet_tcp_int(r5, 0x6, 0x14, &(0x7f0000000400)=0xafb, 0xba76) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) r6 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) r7 = dup2(r6, r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r7, 0x6, 0x40000001, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x347) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7000000ffffffc0250000000000006ac6a692bed900000000000000000000000000000000000000"], 0x0, 0x5}, 0x48) splice(r1, 0x0, r0, 0x0, 0x400000a77, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) ioctl$int_in(r4, 0x5421, &(0x7f0000000040)=0x3ff) close(r0) 09:19:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x9}, @sack_perm, @window={0x3, 0x71}], 0x3) llistxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/39, 0x27) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000080)=0x1ff, 0x4) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000001c0)=0x7) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x0, 0x1}}) 09:19:59 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) eventfd(0x3) r1 = open(&(0x7f0000000540)='./file2\x00', 0x40800, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000580)='nq\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2100, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000009c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10002}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="47c13116ad0f4790b7d67a1effbb92d8ee8e6445d1e88260ff6c44d959aaad9efb3f68b9731650c75c300afc27006321860504dcee6434c07ecd8951c6893f9df3522e318ada606e5962bcd8faa3f0346e81fa50f14a8f33028357bdc4300da01c6f346cf93c98845aba5c1c68fea11bdf8865b8a56db7c51e1f0947fc483ac4a157d3e7d938ad253000bf2228d122bb6f4c941b6071e7c424fc9e143f33de2f"]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setregid(0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000680)=0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x8}, 0x10) pipe(&(0x7f00000004c0)) setgid(r2) chdir(&(0x7f0000000340)='./file1\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) getrlimit(0xe, &(0x7f0000000280)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_config_ext={0xd19, 0xe5d6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) eventfd2(0x10001, 0x0) fallocate(r3, 0x1, 0x0, 0x10000101) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000500)={'team_slave_1\x00', {0x2, 0x4e20, @rand_addr=0x1000000}}) 09:19:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x803) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt(r1, 0x4, 0x0, &(0x7f0000000100)="ba8d2e05011010fffaf86d89ac09ea2b88ab", 0x12) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c63fa0000"], 0x1, 0x0, &(0x7f0000000040)='+'}) 09:19:59 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f0000000240)=0x8000009) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x618, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ptrace(0x4217, r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 108.899520] binder: 4620:4625 ioctl c018620b 0 returned -14 [ 108.917241] binder: 4620:4625 unknown command 16409356 [ 108.932188] binder: 4620:4625 ioctl c0306201 20000140 returned -22 09:19:59 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x80) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000380)="db", 0x1}], 0x1) chmod(&(0x7f0000000080)='./file0/bus\x00', 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x101) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) dup2(r0, r2) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000140)="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") 09:19:59 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000000)=[0x5, 0xffffffffffffffc0]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)={0x20, 0x3, 0x7, 0x2, 0x80000000}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x310, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000002000000000079100400000000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0xffffffffffffffff, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) [ 108.955163] binder: 4620:4625 ioctl c018620b 0 returned -14 [ 108.961371] binder: 4620:4629 unknown command 16409356 [ 108.973297] binder: 4620:4629 ioctl c0306201 20000140 returned -22 09:19:59 executing program 1: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:19:59 executing program 1: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:19:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000140)) getpeername(r0, &(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x80) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000500)={@remote}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001e80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002180)={&(0x7f0000000180)=ANY=[@ANYBLOB="98000000", @ANYRES16=r1, @ANYBLOB="020026bd7000fddbdf25020000000800010095e9844dd2c08408e586e49ea239d30da5b1e8d2a7aacf0e7d7fa7a1711bcaab42fd", @ANYRES32=r2, @ANYBLOB="7c0002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c0004006861736800000000"], 0x98}, 0x1, 0x0, 0x0, 0x40001}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x0, 'wrr\x00', 0x0, 0x0, 0x3f00}, 0x2c) 09:19:59 executing program 1: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) [ 109.040965] capability: warning: `syz-executor2' uses deprecated v2 capabilities in a way that may be insecure 09:19:59 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000006c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xb94) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000680)=0x0) r6 = getpgrp(r5) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r6}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) fsync(r4) ioctl$ASHMEM_SET_PROT_MASK(r8, 0x40087705, &(0x7f0000000280)={0x100000000}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r6}) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, r8, &(0x7f00000005c0)="f2f42245d196f91a48f2b821d3442e277a43f0ca0ad8ed1b65a81f934bc9a4fdca52f744ec264514eba836b2ca9b2e580d83a0ab4e20c5f62b71ca27af042df6ea32e6c5c9369755e64b56aec0188ec11bcea89595863c737ff8c0f248ad0d9201ff46962f0087fc1990817fdbaf8c2d3ca9a833872d38e2a9005b2e2903904e622869", 0x83, 0xf, 0x0, 0x0, r8}, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x17, &(0x7f0000000000)=0x9, 0xfffffffffffffebc) bind$inet6(r7, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r7, 0x1, 0x2f, &(0x7f0000000240)=0x80000200, 0x2e5) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) 09:20:00 executing program 3: r0 = memfd_create(&(0x7f00000001c0)="23947400002eef99754330a358fe888523cf4af9d4d121666ff90000000000000000000000", 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80001000006, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') sendmsg$nl_route(r1, 0x0, 0x40) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 09:20:00 executing program 5: mlockall(0x0) mlockall(0x5) r0 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) setreuid(r0, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000010c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x20) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000001100)=""/145) r3 = memfd_create(&(0x7f0000000080)='\x00', 0x6) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f00000011c0)=""/4096) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@remote}, &(0x7f0000000040)=0x14) munlockall() eventfd(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2100, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x11c, r5, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf74}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xfffffffffffffffd}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100000001}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000540)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000003c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setregid(0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') chdir(&(0x7f0000000340)='./file1\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) inotify_rm_watch(0xffffffffffffffff, 0x0) 09:20:00 executing program 1: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040), 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) r1 = memfd_create(&(0x7f0000000040)='-\x00', 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x100000000, 0x100, 0x9, 0x9}, 0x10) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpeername$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000180)=0x1c) listen(r0, 0xaefb) fcntl$lock(0xffffffffffffffff, 0x2, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000006, 0x0, 0x0) timer_create(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x33, 0x6, @thr={&(0x7f0000000700), 0x0}}, &(0x7f0000000280)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ac0), 0x4) 09:20:00 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup2(r1, r0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000000)=0x1) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000000c0)) 09:20:00 executing program 1: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:00 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) sendto(r0, &(0x7f0000000040)="c3dbba9c271d371d6dd76f822a410916c3beb04ee13c62189c8c8f840b243dfca4e93b426301a0af0ea1b95f0c1a92ae1da6c0593f82df6f08796de30c0985547eca0b4f68a633a957941c93498fdc8f89342d990eb0b1538472495f233e7e", 0x5f, 0x1, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) socket(0x8, 0x800, 0x8000) 09:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:00 executing program 0: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x2000000208972, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x1020000000a) clone(0x0, &(0x7f0000000000), &(0x7f0000000ffc), &(0x7f0000000ffc), &(0x7f0000000000)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x20000, 0x0) fcntl$setlease(r0, 0x400, 0x2) 09:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 09:20:00 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000200)=0xc, 0x80000000000b, 0x4, 0x0, &(0x7f0000000180), 0x1) r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r2 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000006c0)=ANY=[@ANYBLOB="4701000000000000000000000000000000d971b78d4a081c9d9b4368618b9258ec289953a36a601a96d07fa540c91e0dcffa54a8b42b874d15fea2f7dde470447c3d5470421f6fb8e483878fcd7c38be12d3b27a988a71f46e42c63a85691843562823874123d3724106e90cab13fd6ed2b17b3b97e5bbbc182815fedc00a565f7689db3d9ee4f224886fda594224cd57cb1c0ec5bf5df08b20e2c67051e36c5e52b9820c9872c79d34afc07b23cb3996498e8f7825f2413b320705722a62d82711c712bf762b168fa8c3852efcc4ccda59f4cd940ecef0743e45c1a939ce90e1600c155e90b5c131a51f6261a2fa13d40ca02efaf45"]) sendmmsg(r1, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="4c37d54a39bf05cc358bb53a335af6703000406cde8e96c17ef96200000000"], 0x0, 0x0, 0x1000000, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001040)=""/4096) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2f6465762f6c6f3470200083a5bd2a5d6aeca01074b1e5452e66a9466ab2cf7d39a08134ce7a4d50474a60bc841681e814c61e88601b473ad673be347c6628076980d85371a3e3ac02bf80a2ec4eb68ce17d2a9d278ceec0508e294af76e9d601808601ad3ecabd5312e611b2787866e2ef6c04cee0f3b98fcea0b8dfed975dd17336659b2de44f07dc665d113a43a0352acf2ddbc04e002d05597ecaf627b157cd05830a23b418149f2cc74cec830dd0bf9e2b561ab90eeae083dd370bbae3d0000000000000000030000"], 0x0, 0x0, 0x100000, &(0x7f00000002c0)='+{\x00') futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000400)=r3) exit(0x0) INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 09:20:01 executing program 3: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) syz_read_part_table(0x100000000, 0x0, 0x0) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x9, &(0x7f0000000640)=[{&(0x7f0000000100)="b9973494858a0b55345cb2dde4cfe2522ec64af7f46a13a1a34eca3194d78e5089", 0x21, 0x1f}, {&(0x7f0000000140)="ab3f876533d28d9d1effcd61b578d1488c4d688a56a189ea93b369b506120cae7bfedaaffd444b5526287e32c86c33eb7f2d9e42cd023ed20d76bce300e9ce3f3a4e658e6cabcb57c23f371cea327d033f62c31c96c119314f2c2bd5bc0c3508e7d4ccf1505f77207882339ba1304aa3f7aed48f2ba2b044f851b501ef1f38d230d96bca9e6dc104c00a2c5b769b41b341242dc889b48acca48b05fda1a35f74399a8d81bef6524f84d529f002d3842455ba1c59fd902d52e0d5bbc62b6f45fdcdc425dad34ce8", 0xc7, 0x7f}, {&(0x7f0000000240)="66ce0110af9fce91f278f6fb4b1faa6c31a42a7d61f50eae8cb82010c6f6422a601f1451f14d041c18945a5789f18ce17485de48fcfa53d27084b1a81aa10c295e0553e56fcb7a45eaf3e8f9f4cac2dba7c4bbea1d789f861643f1314c1701407f78a5ab12cffb5958a710c40ad8eed8e66a31fce8f290a9ec3b3b361ae4a94deaab5b", 0x83, 0xffffffffffffff05}, {&(0x7f0000000300)="9b967951d9ef06390b610c6acc74c0f889a3c42a9fc43da91fb8952b5a9f8c497a9274763074a48f7b39afa1081b45cbaa6c058b4184af2a0ed4ea099eb761da52d37f6d927bb605c45aa8bcd38a5ec59e25037d50f9f39f249c81450637667ae2636dbd2b5e4345d8dcd13caed253c80877d4f15854fcc34e64fcb4b9a82caf6c6500bb306dce13d2a2f7480e3674fd48bdbee500652a98f5fe85f6e9c642212ef9d1a8c2b0049f2df51eaf078bc850bb558a0f9fad844c8cc0fc855ce137a98c82e9df5afa996eefb39f0c53ead7fd20ff74a71495b80bd710d31b9bcefc878174b31e644787fe419545504d122366ae27", 0xf2, 0x7f}, {&(0x7f0000000400)="5f8aab9c0802ac548d72118fab0900fc20fe5458a6c3e323c7ba6346a7c3f5f5c0d3827ad204371ec3044ec281f574debdaa8c67f97c6512a1147341a7cd4d46255dec1c2e99e9a654f0cff05af565972a40baa193585613e131ae12781ff5aad4e7a9476bfaa70dd849414a531744140479a2d996c4", 0x76, 0x1ff}, {&(0x7f0000000480)="d522f1afc27300daa7ad5d23f26a85522406e1141ec7f11fa625e9f9f6", 0x1d, 0x2}, {&(0x7f00000004c0)="d7185dbdf65973822321eb44", 0xc}, {&(0x7f0000000500)="8bc51bad95cc7fd6f46acdb63796b8224f347a80d03576ddf0c018b6bea70fe9b7e16baa393d80a617034f36f7a78c3119d292f6ad1a859c8b3bac94f3c9abd5d332b538d4025daedaaaa49b14f2", 0x4e, 0x5}, {&(0x7f0000000580)="a04488fb1132c53e142b0b5ae057815a264eebf008f84823689f8be882a481bf474a0c39b104ce92d345b79668af61917c4ecd85ce6e9740e7544b7dd3115c3437773a8260930600d8e7d452b0c94c5338169689cd6eac3c2ad2a8ecd137e81dda2b5f7649a8a1d00fbfd1ad9d87eb690bad706ea305eb532938fc8b903649051fa5bede3e367a6ddf0666e9310c4d013e705bc3be42ef719b708d38a1a0febbdd465b190dacd1763e603a4652662148bd6d8a8a928653ab791310", 0xbb, 0x5a}], 0x0, &(0x7f0000000800)={[{@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@errors_continue='errors=continue'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r0}}, {@dont_appraise='dont_appraise'}]}) 09:20:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000140)={0x6}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400100, 0x30) r4 = open(&(0x7f0000000200)='./file0\x00', 0x80200, 0x81) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1000}, 0x28, 0x2) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000080)={0x6f, @broadcast, 0x4e21, 0x1, 'sh\x00', 0x1, 0x4, 0x3b}, 0x2c) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f00000002c0)="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") r5 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/uts\x00') setns(r5, 0x4000000) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x8a8, 0x9}]}, 0xc, 0x2) 09:20:01 executing program 1: lsetxattr$security_selinux(0x0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:01 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) alarm(0x92) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:20:01 executing program 5: clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4200, r0, 0x8003e, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x33) setpgid(r0, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) 09:20:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000380), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 09:20:01 executing program 1: lsetxattr$security_selinux(0x0, 0x0, &(0x7f0000000140)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:01 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) [ 110.652159] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 09:20:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20000, 0xfffffffffffffffe) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = mmap$binder(&(0x7f0000ff3000/0xa000)=nil, 0xa000, 0x3000000, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x64, 0x0, &(0x7f0000000180)=[@release={0x40046306, 0x1}, @enter_looper, @acquire={0x40046305, 0x3}, @free_buffer={0x40086303, r2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x70, 0x10, &(0x7f00000000c0)=[@ptr={0x70742a85, 0x1, &(0x7f0000000000), 0x1, 0x2, 0x2c}, @fda={0x66646185, 0x9, 0x0, 0x19}, @ptr={0x70742a85, 0x1, &(0x7f0000000080), 0x1, 0x2, 0x2e}], &(0x7f0000000140)=[0x40, 0x78]}}], 0x57, 0x0, &(0x7f0000000200)="ec5dd9210287fabedc56d01772fcb83f0b74e9eea8ceaa2975df4e907728f6ab00b404e1b906e67ea1621c89fdbfae7802d90000a803839a00d730c10d5eb73f2a529ad091c1610cf918556a93b3a2bed8eae35c89bd2c"}) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) 09:20:01 executing program 4: getpgrp(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000040)=""/170) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000001000/0x1000)=nil) mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) [ 110.720813] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 110.740784] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 09:20:01 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) [ 110.779028] FAT-fs (loop3): Unrecognized mount option "euid<00000000000000000000" or missing value 09:20:02 executing program 2: clone(0x4101fffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='map_files\x00') timerfd_gettime(r0, &(0x7f0000000000)) exit(0x0) capset(&(0x7f0000560ff8)={0x19980330}, &(0x7f00003fd000)) renameat(r0, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) r2 = getpgid(0x0) setpgid(r1, r2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x5, 0x5d8, [0x20000400, 0x0, 0x0, 0x20000588, 0x20000740], 0x0, &(0x7f0000000040), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x7, 0x20, 0x89ff, 'nr0\x00', 'gre0\x00', 'bcsf0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x1c}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xe0, 0xe0, 0x158, [@quota={'quota\x00', 0x18, {{0x0, 0x0, 0x8, 0x6}}}, @cgroup0={'cgroup\x00', 0x8, {{0x101}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0xcbd2, 0x3, 0x5, 0x0, 0x0, "7c688d734b8b351d85032acb6af83e9aa074b3c67dc0635836e53c6ed5cbea55469fb9e25c0d5cf8472df3eb547744b6369ce2d44a57f49fdca9e0b7ea5cccd2"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x0, 0x15, 'bridge_slave_0\x00', 'veth1\x00', 'lo\x00', 'dummy0\x00', @remote, [0xff, 0xff, 0x0, 0x0, 0xff], @random="47be4f8c40aa", [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}}, {{{0x1b, 0x9, 0x88f7, '\x00', 'sit0\x00', 'veth1_to_bond\x00', 'vlan0\x00', @random="cd59ff371795", [0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev={[], 0x18}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x17, 0x3, 0x430d, 'rose0\x00', '\x00', 'ip6gretap0\x00', 'bcsf0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe26679280dc01f5a}, [0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@remote}}}]}, @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}}, {{{0x9, 0x2e, 0x89f5, 'erspan0\x00', 'irlan0\x00', '\x00', 'ifb0\x00', @remote, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="dabfb483a9a9", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xb0, 0x118, 0x150, [@devgroup={'devgroup\x00', 0x18, {{0x3, 0x1, 0x3, 0x80000001}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffc}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xea653682ab2c24ea}}}}]}]}, 0x650) 09:20:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db481db6f8", 0x32}], 0x1, 0x81806) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000340)={0x5, 0x0, 0x0, 0x0, 0x8cf}) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x9, 0x8, '9P2000.L'}, 0x15) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000240)={0x2, 0x0, 0x99}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, 0x0) pipe2$9p(&(0x7f0000000180), 0x8176fa36873cae3e) sendfile(r1, r2, 0x0, 0x2000006) dup2(r0, r0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000300)) socket$inet(0x2, 0x80000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 09:20:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x201a7ff5, 0x68}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000001400)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x4, 0x2, 0x2, {0xa, 0x4e23, 0xa60d, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000100)="e5e23e0f558506a9ebbe9081e4ccf392789f91f07b18518e424db5", 0x1b}, {&(0x7f0000000140)}, {&(0x7f0000000180)="26735d0e1b955c59d6931e9f3da8ede41be2ded5878b93c302a0bae321fa91f9a8b390fc062b6a03441bcaca48653a2b81f33c68c4501b26f5f83ced62315a8255e10a620117b375c5b2cd6773f67bb8d5c69de869cb034f6fd62f8d4c45c4fb75be846572850324cdf1226a29d7919f230d6cd6e94d7dfd10d4e600f7a6c997dc7b589df5565cbd05520695131fc5642edb020e685a27ca4830dc9ff3cf9cabadeedd8ed9", 0xa5}, {&(0x7f0000001280)="d8b889e22d3970cd0aa4025fd32de93356593f7c4972902a1e48c6807c36278a00514e39d41832168a1276c021fe5feaeb773478210633257d45921b5a7f1a879fd8668e87ceee5239c8db1136ce5c3ac6a2d5ae0e575b9b1096fe5d4a0dd8b20d814f6fe89f5bcaa30f27a813a53c6a4c7a1849a4a3d94c6df5a9a01e616b0541e9fb7d78ce66263d0d10a75500176909f5a7aaa66cc452a88d8721f0783fd7694c6badf55ae2aef506df9dc172043ff275f360acdfe0736ae84c0cfc1393ea812c2f61bdeed310ee3b4fded805b033c2c7ab08171e3217e2fce0e200a68978b1a8deba1a435f", 0xe7}], 0x5}, 0x5) 09:20:02 executing program 5: sched_setaffinity(0x0, 0x17d, &(0x7f0000000180)=0x4000000000000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x3, 0x0) r3 = dup3(r2, r0, 0x80000) write$P9_RLCREATE(r3, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x2, 0x0, 0x4}, 0x80}}, 0x18) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f00000004c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000380)={'rose0\x00', @ifru_addrs=@in={0x2, 0x4e20, @empty}}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x17, &(0x7f0000000400), 0x4) sendto$inet(r4, &(0x7f0000000000), 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) r5 = dup3(r4, r1, 0x80000) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000040)={0xc, 0x4000000000002, 0x7}) getsockname$inet6(r5, &(0x7f00000001c0), &(0x7f0000000200)=0x1c) sendto$inet(r4, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3}, 0xc26, 0x9, 0x980f}) shutdown(r4, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000600)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r6 = gettid() capset(&(0x7f0000000340)={0x20080522, r6}, &(0x7f0000000480)={0x7, 0x2, 0x5, 0xa3e5, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000500)={"6c6f00000500", {0x2, 0x0, @remote}}) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(r5, 0x8905, &(0x7f00000005c0)) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f00000001c0)={0x2, 0x0, @local}, 0xa) connect$inet(r7, &(0x7f0000000440)={0x2, 0x2, @multicast1}, 0xffffffffffffff64) socket$inet_tcp(0x2, 0x1, 0x0) 09:20:02 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:02 executing program 3: mlockall(0x1) r0 = eventfd(0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0/file0\x00', 0xe, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f00000002c0)='./file0/file0\x00', 0x400000, 0x34) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000380)=0x3, 0x4) exit(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) fsetxattr$security_selinux(r0, &(0x7f0000000480)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:urandom_device_t:s0\x00', 0x171, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000900)='./file0\x00') add_key$keyring(0x0, &(0x7f0000000840)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x8) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x54, 0x2, 0x0, "4d8ce496fbd72967b0b00becb096095a", "bf12212d45509f85cd9ba14c4cfbf6f58ac83899d122f22839e42d3794b5c136c25762aaf374bfb64eb622e8410adc64ab710b8aaac91a35f2f6ce5a9145c5"}, 0x54, 0x1) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000340)=0x200, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) lstat(0x0, &(0x7f0000000680)) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000700)) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@alg, &(0x7f0000000140)=0x80) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:20:02 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 09:20:02 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x170) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000040)=0x54) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="9879d6c9032e2940bca07a3c3d3b0db77afa68d6effbb7271b5d9be3abc8b079f3486b570b5ce5eb1995cdc3405479d929d8d59c743e40429a333cf9a01f3a3e4eeeb905418805ac4268ada503b466c82d7cc96431bd2e88ea0ec9d3546b84bc486ca704c5afaf10a982f982c4a0a3e96ae3cfc8c2edc0aaaeb17df0b9eb4af0eb45835885fe138c2724604569823eef302098b663a2dbce8642c7261cf0f1e2ca47f7a3b0a2d7a573c4d650feb1ab91990cfba337c70b7be787c3a8a494083d18fb62b160", 0xc5, 0x80000000}], 0x100020, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x80) 09:20:02 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 09:20:02 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 09:20:02 executing program 5: gettid() futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x4000000001, 0x0, &(0x7f0000000180), 0x100000) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$TIOCEXCL(r0, 0x540c) accept4$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x800) remap_file_pages(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x4, 0x7f, 0x10800) setxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:utempter_exec_t:s0\x00', 0x25, 0x1) recvfrom$packet(r0, &(0x7f0000000080)=""/142, 0x8e, 0x2000, &(0x7f0000000200)={0x11, 0xf8, r1, 0x1, 0x8, 0x6, @dev={[], 0x19}}, 0x14) 09:20:02 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x0, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) [ 111.873170] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 111.972128] mmap: syz-executor5 (4844) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 112.004466] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 09:20:03 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$selinux_create(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="086d59008acd0c367b5f5d7c3e89bf8a441741d056d8b876152de3d306b5728a67cfaa8033d775e5b55159c6e83c292e6aa54369e591e1d9c82c021e69a5de8fbff3c9b2ae084ff54a447731e6ba5bfb5ece7a"], 0x53) write$selinux_access(r2, &(0x7f0000000000)={'system_u:object_r:etc_t:s0', 0x20, '/usr/sbin/ntpd'}, 0xfffffeff) 09:20:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x69f8, 0x80000) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) fcntl$getown(r0, 0x9) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000268, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x20000) 09:20:03 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x0, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:03 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x170) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000040)=0x54) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000008c0)=[{&(0x7f00000007c0)="9879d6c9032e2940bca07a3c3d3b0db77afa68d6effbb7271b5d9be3abc8b079f3486b570b5ce5eb1995cdc3405479d929d8d59c743e40429a333cf9a01f3a3e4eeeb905418805ac4268ada503b466c82d7cc96431bd2e88ea0ec9d3546b84bc486ca704c5afaf10a982f982c4a0a3e96ae3cfc8c2edc0aaaeb17df0b9eb4af0eb45835885fe138c2724604569823eef302098b663a2dbce8642c7261cf0f1e2ca47f7a3b0a2d7a573c4d650feb1ab91990cfba337c70b7be787c3a8a494083d18fb62b160", 0xc5, 0x80000000}], 0x100020, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x80) 09:20:03 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x430001, 0x0) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f00000000c0)=0x8, 0x4) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000001c0), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0xff42) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$cont(0x420b, r1, 0x8, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) [ 112.776501] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 09:20:03 executing program 3: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4000, 0x20000000000010, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x6000000000000000, 0x10000, 0xfff, 0x1}) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200)) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:man_t:s0\x00', 0x1b, 0x1) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xfffffffffffffffc, 0x21021) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0xc1, 0x0) setsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f0000000240)=0x8, 0x4) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000180)={0x2, 0xbef}) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) 09:20:03 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x0, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0x46a}}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x11, &(0x7f0000000100)={0x80000001}, 0x88) 09:20:03 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r0, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003200)=0x14, 0x80800) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000037c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003780)={&(0x7f0000003380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x800) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) mlockall(0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80000) lseek(r0, 0x0, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:20:03 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0xfffffffffffffe76) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x0, 0x8, 0x8}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, 0x0}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x402a01, 0x0) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x10000, 0x200, 0x2, 0x7fffffff, 0x2, 0x3f, 0x7, 0x117, 0x38, 0x2c5, 0x1, 0xff, 0x20, 0x2, 0x0, 0x4d5567ce, 0x9}, [{0x2, 0x4, 0xb1c, 0x10, 0x7ff, 0x1c84096e, 0x6, 0x8000}, {0x6474e553, 0x3ff, 0x7f, 0xffffffff, 0x7, 0x8, 0x2, 0x7}], "43ab0c40587070d3e232e995f9e3a74e960b369ff5a18db18932106058e33c79fb4f4a217f7bf7f7b9a05fec3bca7de687eb484595de8b1ebff97acf3c019910245b733d5af92f1be2a3ff289a9989dc317a377c6351d567ad834494df26527c2acee5e32b31d6b4838eedf44c0fda82a7bd58cd0fa704a3d6319f83e460b9468b0830d0b534b71a0f6806e03a1f8bd25ea2be87f5765dec10cda2821132c4c1100e24f771c58b26ad23ae8b28f8f3efc2b4b30b6eafd7edd43423932eee04e0d21f0babf0733eab249e", [[]]}, 0x242) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x410200, 0x0) ioctl$KDGETLED(r4, 0x4b31, &(0x7f00000000c0)) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r3+10000000}, 0x0, 0x0) 09:20:03 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x0, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffaf) r3 = socket$inet(0x2, 0x3, 0x1) accept4(r1, &(0x7f0000000100)=@nfc, &(0x7f0000000000)=0x80, 0x80000) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x810005, 0x0) [ 113.306201] kauditd_printk_skb: 4 callbacks suppressed [ 113.306207] audit: type=1400 audit(1544520003.900:24): avc: denied { associate } for pid=4898 comm="syz-executor3" name="uhid" dev="devtmpfs" ino=1081 scontext=system_u:object_r:man_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 [ 113.441834] audit: type=1400 audit(1544520003.930:25): avc: denied { write } for pid=4898 comm="syz-executor3" name="net" dev="proc" ino=11690 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 113.520831] audit: type=1400 audit(1544520003.930:26): avc: denied { add_name } for pid=4898 comm="syz-executor3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 113.592177] audit: type=1400 audit(1544520003.930:27): avc: denied { create } for pid=4898 comm="syz-executor3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 09:20:04 executing program 2: inotify_init() socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="430200000000000008000a00060000001800120008000100767469000c00020008000400e0000002"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000680)='uid_map\x00') r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000002c0)) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) 09:20:04 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x0, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:04 executing program 3: r0 = dup(0xffffffffffffff9c) ioctl$BLKRRPART(r0, 0x125f, 0x0) r1 = socket$inet(0x10, 0x5, 0x4) perf_event_open(&(0x7f0000940000)={0x20000000000002, 0x70, 0xee6a, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="4c0000001200ff08fffefd956f84db1c76a6c6430b000000000094083540150024001d001fc411799f6d88717d20b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28", 0x4c}], 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) getpgid(r2) 09:20:04 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, 0x0) accept$packet(r0, &(0x7f0000008840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008880)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000a700)={{{@in, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000088c0)=0xe8) accept4(r2, &(0x7f000000a800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008980)=0x80, 0x0) recvmmsg(r2, &(0x7f000000fe00)=[{{&(0x7f000000a880)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000008b40)=[{&(0x7f000000a900)=""/138, 0x8a}, {&(0x7f000000ebc0)=""/202, 0xca}, {&(0x7f000000ecc0)=""/215, 0xd7}], 0x3, 0x0, 0x0, 0x3ff}, 0x8001}, {{&(0x7f000000a9c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f000000af40)=[{&(0x7f000000eec0)=""/119, 0x77}], 0x1, &(0x7f000000ef40)=""/217, 0xd9, 0x48000000000}, 0x1}, {{0x0, 0x0, &(0x7f000000f180)=[{&(0x7f000000c640)=""/33, 0x21}, {&(0x7f000000f040)=""/81, 0x51}, {&(0x7f000000f0c0)=""/112, 0x70}, {&(0x7f000000c740)=""/49, 0x31}, {&(0x7f000000f140)=""/2, 0x2}], 0x5, &(0x7f000000f200)=""/106, 0x6a, 0x9}}, {{&(0x7f000000f280)=@nfc, 0x80, &(0x7f000000f7c0)=[{&(0x7f000000f300)=""/135, 0x87}, {&(0x7f000000f3c0)=""/197, 0xc5}, {&(0x7f000000f4c0)=""/79, 0x4f}, {&(0x7f000000f540)=""/188, 0xbc}, {&(0x7f000000f600)=""/51, 0x33}, {&(0x7f000000f700)=""/120, 0x78}, {0x0}], 0x7, 0x0, 0x0, 0x9}}, {{&(0x7f000000f840)=@alg, 0x80, &(0x7f000000f9c0)=[{&(0x7f000000f8c0)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x3}, 0x7fff}, {{&(0x7f000000fa80)=@hci, 0x80, &(0x7f000000fb80)=[{&(0x7f000000fb00)=""/90, 0x5a}, {&(0x7f0000013f80)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xfffffffffffffff7}, 0x2}, {{0x0, 0x0, &(0x7f000000fcc0)=[{0x0}], 0x1, &(0x7f000000fd00)=""/227, 0xe3, 0xde}, 0x92}], 0x7, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000ffc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000100c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000010100)={{{@in, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000010200)=0xe8) accept$packet(r1, &(0x7f0000010240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000010280)=0x14) getsockname$packet(r1, &(0x7f0000016080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000160c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000016140)) getsockname(r2, &(0x7f0000016180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000016200)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000016540)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000016700)={'team0\x00'}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000016800), &(0x7f0000016840)=0x14) accept4(r0, &(0x7f0000016880)=@xdp, &(0x7f0000016900)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000013a40)={{{@in=@multicast2, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000179c0)={@multicast1, @loopback}, &(0x7f0000017a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000017b80)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000017cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000017d00)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000017e40)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) accept$packet(r0, &(0x7f0000017ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000017f00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000018780)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) r3 = gettid() ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'\x00', 0x5}) fcntl$setown(r2, 0x8, r3) sendto$inet(r2, &(0x7f0000000200), 0x0, 0x20008011, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x0, 0x100000001, 0x0, r4}, 0x1c) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000087c0)={0x0, @dev}, &(0x7f0000008800)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f00000089c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008a00)=0x14) recvmmsg(r2, &(0x7f000000a5c0)=[{{&(0x7f0000008b80)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000008d80)=[{&(0x7f0000008c00)=""/18, 0x12}, {&(0x7f0000008c40)=""/7, 0x7}, {&(0x7f0000008c80)=""/112, 0x70}, {&(0x7f0000008d00)=""/106, 0x174}], 0x4, &(0x7f0000008dc0)=""/119, 0x77, 0x4}, 0x80}, {{0x0, 0x364, &(0x7f0000008f40)=[{&(0x7f0000008e40)=""/160, 0xa0}, {&(0x7f0000008f00)=""/49, 0x31}], 0x2, &(0x7f0000008f80)=""/169, 0xa9, 0x1}, 0xfba}, {{&(0x7f0000009040)=@can, 0x80, &(0x7f00000091c0)=[{&(0x7f00000090c0)=""/203, 0xcb}], 0x1, &(0x7f0000009200)=""/36, 0x24, 0x7}, 0x8}, {{0x0, 0x0, &(0x7f000000a340)=[{&(0x7f0000009240)=""/195, 0xffffffffffffffb8}, {&(0x7f0000009340)=""/4096, 0x1000}], 0x2, &(0x7f000000a380)=""/55, 0x37, 0x5}, 0x4234}, {{&(0x7f000000a3c0)=@un=@abs, 0x80, &(0x7f000000a580)=[{&(0x7f000000a440)=""/35, 0x23}, {&(0x7f000000a480)=""/235, 0xeb}], 0x2, 0x0, 0x0, 0x5}, 0x603}], 0x5, 0x40, 0x0) recvmmsg(r2, &(0x7f0000013840)=[{{&(0x7f0000010300)=@nl, 0x80, &(0x7f0000010440)=[{&(0x7f0000010380)=""/5, 0x5}, {&(0x7f00000103c0)=""/96, 0x60}], 0x2, &(0x7f0000010480)=""/139, 0x8b, 0x9}, 0x5}, {{&(0x7f0000010540)=@nfc_llcp, 0x80, &(0x7f0000010980)=[{&(0x7f00000105c0)=""/39, 0x27}, {&(0x7f0000010600)=""/92, 0x5c}, {&(0x7f0000010680)=""/244, 0xf4}, {&(0x7f0000010780)=""/20, 0x14}, {&(0x7f00000107c0)=""/151, 0x97}, {&(0x7f0000010880)=""/57, 0x39}, {&(0x7f00000108c0)=""/152, 0x98}], 0x7, &(0x7f0000010a00)=""/52, 0x34, 0x8}, 0x6}, {{&(0x7f0000010a40)=@ipx, 0x80, &(0x7f0000010fc0)=[{&(0x7f0000010ac0)=""/12, 0xc}, {&(0x7f0000010b00)=""/118, 0x76}, {&(0x7f0000010b80)=""/19, 0x13}, {&(0x7f0000010bc0)=""/254, 0xfe}, {&(0x7f0000010cc0)=""/58, 0x3a}, {&(0x7f0000010d00)=""/38, 0x26}, {&(0x7f0000010d40)=""/224, 0xe0}, {&(0x7f0000010e40)=""/171, 0xab}, {&(0x7f0000010f00)=""/171, 0xab}], 0x9, &(0x7f0000011080)=""/30, 0x1e, 0x3d}, 0x9cb9}, {{&(0x7f00000110c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000013200)=[{&(0x7f0000011140)=""/4096, 0x1000}, {&(0x7f0000012140)=""/4096, 0x1000}, {&(0x7f0000013140)=""/182, 0xb6}], 0x3, &(0x7f0000013240)=""/248, 0xf8, 0x8}}, {{&(0x7f0000013340)=@hci, 0x80, &(0x7f00000133c0), 0x0, &(0x7f0000013400), 0x0, 0xfffffffffffffffa}, 0xbecb}, {{0x0, 0x0, &(0x7f00000134c0)=[{&(0x7f0000013440)=""/126, 0x7e}], 0x1, &(0x7f0000013500)=""/100, 0x64, 0xfff}}, {{&(0x7f0000013580)=@alg, 0x80, &(0x7f00000137c0)=[{&(0x7f0000013600)=""/88, 0x58}, {&(0x7f0000013680)=""/119, 0x77}, {&(0x7f0000013700)=""/168, 0xa8}], 0x3, &(0x7f0000013800)=""/53, 0x35}, 0x20}], 0x7, 0x23, &(0x7f0000013a00)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000013b80)={{{@in6, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000013c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000013d80)={'team0\x00'}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000013f00)={0x0, @dev, @dev}, &(0x7f0000013f40)=0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8983, 0x0) 09:20:04 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x0, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:04 executing program 3: capset(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000000bfa30000000000ffffffdb3af0ff00060000000000012d640300000000006504040001ed0ebb1c04000010000000b7050000000000006203eeffffffffff840009002e000000b7000000000000950000000100000000000000b4871acb7841802951c4665315294cda096a71713b4a965bc9d590933c8e209abc4db3d1ec3bd57be4c23543f729660b2c550d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x48) fsync(r0) 09:20:04 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f00000000c0)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000039a594349c1fd83d000000400000eaffffffffffffff0000000000000000000000380003"], 0x39) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tee(r0, r0, 0x5, 0x2) poll(&(0x7f0000000300), 0x0, 0x1000) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000040)=""/108, &(0x7f0000000100)=0x6c) [ 113.885459] print_req_error: I/O error, dev loop0, sector 0 [ 113.891554] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 113.899488] print_req_error: I/O error, dev loop0, sector 8 [ 113.905366] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 113.913247] print_req_error: I/O error, dev loop0, sector 16 [ 113.919725] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 113.927474] print_req_error: I/O error, dev loop0, sector 24 [ 113.933419] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 113.941188] print_req_error: I/O error, dev loop0, sector 32 [ 113.947074] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 113.954847] print_req_error: I/O error, dev loop0, sector 40 [ 113.960850] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 113.968720] print_req_error: I/O error, dev loop0, sector 48 [ 113.974686] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 113.982439] print_req_error: I/O error, dev loop0, sector 56 [ 113.988279] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 113.996144] print_req_error: I/O error, dev loop0, sector 64 [ 114.002012] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 114.009865] print_req_error: I/O error, dev loop0, sector 72 [ 114.015814] Buffer I/O error on dev loop0, logical block 9, lost async page write 09:20:05 executing program 0: socket$inet(0x2, 0x3, 0x19) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') add_key(&(0x7f00000001c0)='logon\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f00000006c0)="c1ebf0d9fe05eb41d4", 0x9, 0xffffffffffffffff) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000300)) mount(&(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYRESOCT, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYRESOCT=r2], @ANYRES64=r2], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x200000, &(0x7f000000a000)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x100000000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x200, 0x0) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) unlink(0x0) inotify_init() dup(r0) r5 = request_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000680)='^)}\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000500)="819233f859a511ffda04087015713abf796016ba7b12da5744d21540d2ab5f43021130cbad08a3a1cab143e536a4957e5c15a355d47b51f52be86e8db56bc99412104df1a3e7f438d96a2af641eae31127de70e265ac22f87bd464d958bfcf5a6bb99a5fd6c11df53b2f6ab79ced7a5202330e0764de7fb3206a4ab1cab91a4bef023972097e82afa31603f1a97265cf35b6723415324566d82e8cb079996bc9a6be1af77fedff599d7b4291c22029ed11cac377a8d6f0ad1643c6aff4ebfeb298d726c41d147b3387420fce42e2071af50cf0f17042e016597bedbe21bedae6147730f658fc834758f3c619dbbb10e179b5e1b927c326", 0xf7, r5) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:05 executing program 4: setxattr$security_smack_transmute(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x0) r0 = memfd_create(&(0x7f0000000100)="656f307573657244aa19bf93948d77bd10892c924129aecd10817ae04395266dc3165804ff3d37899d88d97352ff67d2eb22016b6eb304a64fc63ac52de48d0000000000000000000000000000", 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff38) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001180)='/dev/zero\x00', 0x100, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f0000000280)=""/111, 0x6f) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x1) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xffffffea) write(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'team_slave_0\x00', {0x2, 0x4e20, @multicast2}}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0xe007) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0xfffffffffffff801) socket$inet6(0xa, 0x1000000000002, 0x10001) socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') rt_sigtimedwait(&(0x7f0000000000)={0x8}, 0x0, &(0x7f0000000040), 0x8) 09:20:05 executing program 3: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xda) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) signalfd4(r1, &(0x7f00000000c0)={0x4}, 0x8, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) readv(r2, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/118, 0x76}, {&(0x7f0000000380)=""/193, 0xc1}], 0x2) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000004c0)=""/246) pread64(r3, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000fcfc0000000000000000000000"], 0x28}}, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000200)=""/183) dup2(r2, r1) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) 09:20:05 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0xfffffffffffffe76) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x0, 0x8, 0x8}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, 0x0}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x402a01, 0x0) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x10000, 0x200, 0x2, 0x7fffffff, 0x2, 0x3f, 0x7, 0x117, 0x38, 0x2c5, 0x1, 0xff, 0x20, 0x2, 0x0, 0x4d5567ce, 0x9}, [{0x2, 0x4, 0xb1c, 0x10, 0x7ff, 0x1c84096e, 0x6, 0x8000}, {0x6474e553, 0x3ff, 0x7f, 0xffffffff, 0x7, 0x8, 0x2, 0x7}], "43ab0c40587070d3e232e995f9e3a74e960b369ff5a18db18932106058e33c79fb4f4a217f7bf7f7b9a05fec3bca7de687eb484595de8b1ebff97acf3c019910245b733d5af92f1be2a3ff289a9989dc317a377c6351d567ad834494df26527c2acee5e32b31d6b4838eedf44c0fda82a7bd58cd0fa704a3d6319f83e460b9468b0830d0b534b71a0f6806e03a1f8bd25ea2be87f5765dec10cda2821132c4c1100e24f771c58b26ad23ae8b28f8f3efc2b4b30b6eafd7edd43423932eee04e0d21f0babf0733eab249e", [[]]}, 0x242) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x410200, 0x0) ioctl$KDGETLED(r4, 0x4b31, &(0x7f00000000c0)) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r3+10000000}, 0x0, 0x0) 09:20:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000059c0)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/182, 0xb6}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/188, 0xbc}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/145, 0x91}], 0x5, &(0x7f0000000440)=""/118, 0x76}, 0x88}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000540)=""/226, 0xe2}], 0x1, &(0x7f00000012c0)=""/4096, 0x1000}, 0xc38}, {{&(0x7f0000000680)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/162, 0xa2}], 0x1}, 0xfff}, {{&(0x7f0000000800)=@hci, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000880)=""/82, 0x52}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f0000000900)=""/139, 0x8b}, {&(0x7f00000009c0)=""/216, 0xd8}, {&(0x7f0000000ac0)=""/203, 0xcb}], 0x5}, 0x20}, {{&(0x7f0000000c40)=@ax25, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)=""/16, 0x10}, {&(0x7f0000000d00)=""/142, 0x8e}], 0x2, &(0x7f0000000e00)=""/186, 0xba}, 0x6}, {{&(0x7f0000000ec0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000000f40)=""/148, 0x94}, {&(0x7f0000001000)=""/201, 0xc9}, {&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f0000001100)=""/157, 0x9d}], 0x4, &(0x7f0000004300)=""/24, 0x18}, 0x8001}, {{&(0x7f0000004340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000005900)=[{&(0x7f00000043c0)=""/155, 0x9b}, {&(0x7f0000004480)=""/156, 0x9c}, {&(0x7f0000004540)=""/210, 0xd2}, {&(0x7f0000004640)=""/47, 0x2f}, {&(0x7f0000004680)=""/240, 0xf0}, {&(0x7f0000004780)=""/66, 0x42}, {&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000005800)=""/240, 0xf0}], 0x8, &(0x7f0000005980)=""/24, 0x18}, 0x8}], 0x7, 0x10000, &(0x7f0000005b80)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000011c0)={{{@in=@multicast1}}, {{@in6}, 0x0, @in6=@remote}}, 0xfffffffffffffffd) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005bc0)='cgroup.events\x00', 0x0, 0x0) syz_open_pts(r1, 0x40040) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:05 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000036c0)=ANY=[], &(0x7f0000000340)=""/140, 0x8c) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x200007fd, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000003a80)={&(0x7f0000f2b000/0x4000)=nil, 0x400000}, &(0x7f0000003840)=0x8) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x519}], 0x1, 0x0, 0x0, 0x800}, 0x44804) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0xc7bb8b5be4aa9d1c) read(r1, &(0x7f0000000200)=""/225, 0xe1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000040c0)=ANY=[@ANYBLOB="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"], 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000003ac0)='/selinux/enforce\x00', 0x4600, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$sock_proto_private(r1, 0x89e8, &(0x7f0000003880)="de743a257cc1de0f1c046f7032316ca3c6b3d6128f76") getresuid(&(0x7f0000003fc0), &(0x7f0000000bc0), &(0x7f0000003f80)) r3 = add_key$user(&(0x7f0000000b40)='user\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000004000)="c2ca8f1af51189d9c651206f49a5dba143532173972f6a78676c62e8460e0bc550966d8e7f8970828da2a3c018bc4be55c57042835df7761708ba49cabaf0801f72f68dc970f8eaa94a10eecc0819fabe79250889f184dd08cf7816df47fe603445489e3eafce6e267f7aceb1bb19d69628bbd9529bf5119d5253856f15013da17c81dd4549b6b2c98eea4770c93d4f667f1bbd925616803df0f67403538cf404bc563861d6609ee5e16", 0xaa, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000004780)='id_resolver\x00', &(0x7f00000047c0)={'syz', 0x2}, &(0x7f0000004800)='proc+\x00', 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r3, &(0x7f00000046c0)=[{&(0x7f0000004640)="5dbdddfd40fd033fffb65a6b6cab6cd9b465aa8b5372404713f4cd7235524fa6b5d71ff96d9fb0c54eff5ce5feee9673f36fae342d15e0ac0d4956228dbedb795a10afcdb24eee475775feff98ad1affe87cfc8bc6fa", 0x56}], 0x1, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000038c0)={0xff, @multicast2, 0x4e21, 0x2, 'rr\x00', 0x8, 0xff, 0xb}, 0x2c) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000036c0)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000003940)='./file0\x00', 0x10000890) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000003a40)) sendmsg$nl_netfilter(r0, &(0x7f0000003740)={&(0x7f0000003800)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000003700)={&(0x7f0000003900)=ANY=[@ANYBLOB="080027f3190000000000000000000000185b000000000000007c75", @ANYRES32=r5], 0x1f}}, 0x800) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000400)=0x3) recvmmsg(r1, &(0x7f0000003540)=[{{&(0x7f0000000e40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}, {&(0x7f0000000fc0)=""/29, 0x1d}, {&(0x7f0000001000)=""/201, 0xc9}], 0x3, &(0x7f0000001140)=""/192, 0xc0, 0x7}, 0xfffffffffffff0e1}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/250, 0xfa}, {&(0x7f00000013c0)=""/19, 0x13}, {&(0x7f0000001400)=""/1, 0x1}], 0x4, &(0x7f0000001840)=""/4096, 0x1000, 0x8001}, 0x7fffffff}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/207, 0xcf}, {&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/216, 0xd8}, {&(0x7f00000017c0)=""/34, 0x22}], 0x5, &(0x7f00000028c0)=""/168, 0xa8}, 0xcd}, {{&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/242, 0xf2}, {&(0x7f0000002bc0)=""/9, 0x9}, {&(0x7f0000002c00)=""/248, 0xf8}, {&(0x7f0000002d00)=""/207, 0xcf}, {&(0x7f0000002e00)=""/180, 0xb4}], 0x7, &(0x7f0000002f40)=""/93, 0x5d, 0xb0}, 0x7}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/117, 0x75}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/77, 0x4d}, {&(0x7f0000003140)=""/159, 0x9f}], 0x4, &(0x7f0000003240)=""/236, 0xec, 0x9}, 0x2}, {{&(0x7f0000003340)=@sco, 0x80, &(0x7f0000003400)=[{&(0x7f00000033c0)=""/32, 0x20}], 0x1, &(0x7f0000003440)=""/232, 0xe8, 0x4}, 0x6205cde9}], 0x6, 0x0, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000d40)=[&(0x7f0000000480)='!\x00', &(0x7f00000004c0)='btrfs.', &(0x7f0000000500)='vboxnet1vboxnet0\x00', &(0x7f0000000540)='btrfs.', &(0x7f0000000580)='vboxnet1vboxnet0\x00', &(0x7f00000005c0)='proc+\x00', &(0x7f0000000d00)='vboxnet1vboxnet0\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='vboxnet1vboxnet0\x00', &(0x7f0000000dc0)='vboxnet1vboxnet0\x00']) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f00000039c0)={0x101, {0x2, 0x4e21, @rand_addr=0x4}, {0x2, 0x4e21}, {0x2, 0x4e20, @multicast1}, 0x8, 0x0, 0x3, 0xa9d6, 0x8, &(0x7f0000003980)='veth1_to_bond\x00', 0x1000, 0x0, 0x1}) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/162, &(0x7f0000000000)=0xa2) fsetxattr$security_evm(r6, &(0x7f0000003780)='security.evm\x00', &(0x7f00000037c0)=ANY=[@ANYBLOB="02a9e9ff0aa4bedf5f5a03c8e25cc648c592884b2a"], 0x1, 0x2) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x15, 0x5, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x15, 0x5, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 09:20:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r3 = gettid() r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000000c0), 0x4) rt_tgsigqueueinfo(r2, r3, 0x25, &(0x7f0000000040)={0x16, 0xffffffffffffffc0, 0x8ac}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) madvise(&(0x7f0000a62000/0x1000)=nil, 0x200000, 0x10200000008) [ 114.780666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 09:20:05 executing program 0: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/create\x00', 0x2, 0x0) r1 = getpid() wait4(r1, &(0x7f0000000100), 0x1000000, &(0x7f0000000500)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000340)="e8115aba96031f623d", 0x9) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x1) creat(&(0x7f0000000440)='./bus\x00', 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000498000)={&(0x7f0000de2ff4), 0xc, &(0x7f000024dff0)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x800000001, 0x0, 0x0, {}, [@typed={0x14, 0x12, @ipv6=@mcast1}]}, 0x28}}, 0x0) sched_getaffinity(r1, 0x8, &(0x7f00000003c0)) getgroups(0x1, &(0x7f0000000640)=[0x0]) setfsgid(r6) fcntl$setstatus(r0, 0x4, 0x4400) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x1, 0xfce, 0x0, 0x7fff, 0x0, 0x2, 0x0, 0x9, 0x580, 0x7, 0x0, 0xffffffff, 0x0, 0x1ff, 0x7, 0x0, 0x3, 0x2, 0x6, 0x0, 0x40, 0xc3b, 0x100000000, 0x0, 0x0, 0x5, 0x4, 0x0, 0x8, 0xfffffffffffff284, 0x8, 0x2, 0x0, 0x1b82, 0x40, 0x3f, 0x0, 0x30000000000000, 0x2, @perf_config_ext={0x3ff, 0x4}, 0x46, 0x0, 0x0, 0x0, 0x10001, 0x7, 0xe66a}, 0x0, 0x2, r3, 0xb) r7 = creat(&(0x7f0000000400)='./bus\x00', 0x3d) rmdir(&(0x7f0000000380)='./bus\x00') r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) fstat(r7, &(0x7f0000000980)) fstat(r0, &(0x7f0000000a00)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(r2, &(0x7f0000000b00)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) geteuid() sendmmsg$unix(r4, &(0x7f0000001580)=[{&(0x7f0000001400)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000001500)="b7ae115436a2c1a0a44896f9c8fec7f26aecf9429e180896b258fff6562565fb3bc070290e08516e85fbe5fbba48cedabe2477dc621c27d2ec", 0x39}], 0x1, 0x0, 0x0, 0x4004004}], 0x1, 0x10) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f00000000c0)) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x15, 0x5, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 09:20:05 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:05 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x498, 0x0, 0x118, 0x0, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f0000000040), {[{{@arp={@broadcast, @local, 0xff000000, 0xff000000, @mac=@local, {[0x0, 0xff, 0xff, 0xff, 0xff]}, @mac=@dev={[], 0xb}, {[0xff, 0xff, 0x0, 0xff]}, 0x0, 0x200, 0x2, 0x3, 0xd0, 0x9db, 'tunl0\x00', 'ip6gretap0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xfffffffffffff801}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x3c77, 0xc30}}}, {{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x100000001, 0x100000001, 0x400, 0x80000001, 0x0, "9507479a3ea0bdeed14b258118eb6a15902bb2e21a8a3c25fc641f88fbc49cedadce29641fc4b52e6d431f587e90eada375edab790f2d9eb0489c945d9bf08e6"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_TSC(0x19, &(0x7f0000000600)) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) munlock(&(0x7f0000000000/0x4000)=nil, 0x4000) [ 115.508698] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 09:20:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$netlink(r2, &(0x7f00000006c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000}, 0xc) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000680)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000003c0)=r3) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000400)={0x3, 0xbe}, 0xfffffc73) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x3c2, &(0x7f00000000c0)=0x9) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000240)={0xffffffffffffe31b, 0xffff, 0x6}) r9 = getpgrp(0x0) capget(&(0x7f00000001c0)={0x20080522, r9}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f0000000300)) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) fsync(r8) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) setfsgid(r12) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r10, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r10, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r13 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r13, 0x2007fff) sendfile(r11, r13, 0x0, 0x8000fffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 09:20:06 executing program 0: syz_read_part_table(0xffffffbfffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000a00fcffffa5dba960e352beba40000000000000000000000000000000000000000000000000000100000000000000000055aa", 0x40, 0x1c0}]) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) 09:20:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x5, &(0x7f00000001c0)={0x3}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 09:20:06 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:06 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='cgroup\x00') getdents64(r1, 0x0, 0x0) 09:20:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f0000000b00)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) syz_emit_ethernet(0x1e, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x0, 0x3, [0x517, 0x8f0, 0x4ef, 0xf26]}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000b40)=0x100) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@loopback, @in6=@local}}, {{@in=@empty}, 0x0, @in=@remote}}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) syncfs(r2) syz_extract_tcp_res(&(0x7f0000000080), 0xe7f0, 0x1) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 09:20:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0x5) r2 = dup2(r0, r0) write$input_event(r2, &(0x7f0000000000)={{}, 0x1, 0x200, 0x7}, 0x18) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@ipv6_delrule={0x2c, 0x21, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, [@FIB_RULE_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1}}]}, 0x2c}}, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) 09:20:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000280)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3], 0xffffffffffffffff}, @mcast2={0xff, 0xffffff89}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) r3 = dup3(r2, r1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r3, 0x7, 0x1}, 0x14) dup2(r2, r1) socket$packet(0x11, 0x2, 0x300) getpeername$inet(r0, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) write$tun(r0, &(0x7f00000001c0)={@void, @void, @eth={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@canfd={0xd, {{0x3, 0x8, 0x1, 0x4}, 0x24, 0x1, 0x0, 0x0, "3e10e880768a538ae4e72985dba91a49aa6996cd61be565b3de6b324907c199639b0224e64e4fc91db4874825193649d7c0a00270dd2013063b66b350ebb2e1a"}}}}}, 0x56) r4 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/126) getpid() uname(&(0x7f0000000000)=""/197) 09:20:06 executing program 0: syz_read_part_table(0xffffffbfffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000a00fcffffa5dba960e352beba40000000000000000000000000000000000000000000000000000100000000000000000055aa", 0x40, 0x1c0}]) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) 09:20:06 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:06 executing program 4: setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x48000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r1, r2}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @multicast2, 0x0, 0x0, "736564000000000000e8000000ec00", 0x0, 0x0, 0x3f00}, 0x2c) [ 115.664254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5081 comm=syz-executor4 [ 115.676024] input: syz0 as /devices/virtual/input/input5 [ 115.689255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5081 comm=syz-executor4 [ 115.743966] input: syz0 as /devices/virtual/input/input6 09:20:06 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x2565f4b903356b45, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x5}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x40) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x24, 0x800000000005, 0x0, 0x4000000000000000, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) 09:20:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000002640)={&(0x7f0000000340)=@generic, 0x80, &(0x7f00000025c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/18, 0x12}, {&(0x7f0000000180)=""/27, 0x1b}, {&(0x7f00000013c0)=""/24, 0x18}, {&(0x7f0000001480)=""/48, 0x30}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x8, &(0x7f0000003180)=""/4096, 0x1000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000000), 0x0, 0x0, 0x106}}], 0x1, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000100000002ab0000825700"], 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200080, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000002c0)=""/66) ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f0000000100)={&(0x7f0000000240)=""/67, 0x43}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, r4, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/load\x00', 0x2, 0x0) dup3(r3, r5, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') preadv(r6, &(0x7f00000017c0), 0x1a1, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r8) setuid(r8) 09:20:07 executing program 0: syz_read_part_table(0xffffffbfffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000a00fcffffa5dba960e352beba40000000000000000000000000000000000000000000000000000100000000000000000055aa", 0x40, 0x1c0}]) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) 09:20:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe20, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xed5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') preadv(r0, &(0x7f0000000480), 0x247, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0x0, 0x0, 0x1, {}, {0x0, 0x1}, @ramp}) 09:20:07 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000300)='mime_type\x00', &(0x7f0000000340)='/selinux/policy\x00', &(0x7f0000000380)='/selinux/policy\x00', &(0x7f00000003c0)='/selinux/policy\x00', &(0x7f0000000400)='\x00'], &(0x7f0000000540)=[&(0x7f0000000480)='/selinux/policy\x00', &(0x7f00000004c0)='ppp0\x00', &(0x7f0000000500)='/selinux/policy\x00']) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x1400) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000580)) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @multicast2}}, 0x0, 0x178a00000, 0x0, "c33b9ae002a1d1ddcc7bbc32492e0960402ad32ba3f6171af6f01a068a027db91cc60e8033c3cb3e0fddedb858607dd900de1e7b39a2c080c2e497c4544940250d2b6bb0f83072eb2703da5d51a8fa26"}, 0xd8) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000151a050000000000000000000200000014000200fe800000000000000000000000000000"], 0x28}}, 0x0) 09:20:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000280)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3], 0xffffffffffffffff}, @mcast2={0xff, 0xffffff89}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) r3 = dup3(r2, r1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r3, 0x7, 0x1}, 0x14) dup2(r2, r1) socket$packet(0x11, 0x2, 0x300) getpeername$inet(r0, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) write$tun(r0, &(0x7f00000001c0)={@void, @void, @eth={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@canfd={0xd, {{0x3, 0x8, 0x1, 0x4}, 0x24, 0x1, 0x0, 0x0, "3e10e880768a538ae4e72985dba91a49aa6996cd61be565b3de6b324907c199639b0224e64e4fc91db4874825193649d7c0a00270dd2013063b66b350ebb2e1a"}}}}}, 0x56) r4 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/126) getpid() uname(&(0x7f0000000000)=""/197) 09:20:07 executing program 5: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000240)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f00000003c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet6_tcp_int(r1, 0x6, 0xb, &(0x7f0000000080)=0x8000, 0x4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x46) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000580)={0x0, 0x80, 0x2c}, 0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) readv(r5, &(0x7f0000000b00)=[{&(0x7f0000000800)=""/155, 0x9b}, {&(0x7f00000008c0)=""/96, 0x60}, {&(0x7f0000000940)=""/226, 0xe2}, {0x0}, {&(0x7f0000000ac0)=""/35, 0x23}], 0x5) accept4(r4, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) syz_open_dev$binder(&(0x7f00000005c0)='/dev/binder#\x00', 0x0, 0x2) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) shutdown(r5, 0x1) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x4) 09:20:07 executing program 0: syz_read_part_table(0xffffffbfffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000a00fcffffa5dba960e352beba40000000000000000000000000000000000000000000000000000100000000000000000055aa", 0x40, 0x1c0}]) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) 09:20:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000001c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000004c0)='tunl0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0xbb1) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x20011, r4, 0x2000000000000) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 116.464811] input: syz0 as /devices/virtual/input/input7 09:20:07 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r1, 0x2, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe33}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x626}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000010}, 0x40004) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000000000000000002000000da4c3b88e60434eafad09314000200fe800000000000000000000000000000000000000000"], 0x28}}, 0x0) [ 116.575172] SELinux: failed to load policy 09:20:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000280)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3], 0xffffffffffffffff}, @mcast2={0xff, 0xffffff89}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) r3 = dup3(r2, r1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r3, 0x7, 0x1}, 0x14) dup2(r2, r1) socket$packet(0x11, 0x2, 0x300) getpeername$inet(r0, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) write$tun(r0, &(0x7f00000001c0)={@void, @void, @eth={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@canfd={0xd, {{0x3, 0x8, 0x1, 0x4}, 0x24, 0x1, 0x0, 0x0, "3e10e880768a538ae4e72985dba91a49aa6996cd61be565b3de6b324907c199639b0224e64e4fc91db4874825193649d7c0a00270dd2013063b66b350ebb2e1a"}}}}}, 0x56) r4 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/126) getpid() uname(&(0x7f0000000000)=""/197) 09:20:07 executing program 0: syz_read_part_table(0xffffffbfffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000a00fcffffa5dba960e352beba40000000000000000000000000000000000000000000000000000100000000000000000055aa", 0x40, 0x1c0}]) [ 116.732831] input: syz0 as /devices/virtual/input/input8 09:20:07 executing program 1: lsetxattr$security_selinux(0x0, 0x0, 0x0, 0xffffffca, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x15, 0x5, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0) rt_sigaction(0x27, &(0x7f0000000040)={&(0x7f0000000000)="0f3a0fcf2a2e67470f67830800000036f0f711f344a50f71f6ff36470fe0f166460ff94f00ff6f0d432469c402ed40d8", {0x4}, 0x8000002, &(0x7f0000000140)="c463e50f62f0f066430f78c0321ec4c1d05485ffeffffff20f1adcc4e1fd29d0673ef04581251afb000000000000660f3840088f4978c23e8fc800975c3d001626440fba6fd500"}, &(0x7f0000000280)={&(0x7f00000001c0)="660f383edd66400f3833544708f042ff4900c4c2fd2026c4e11d72e700c401a5d5edc441dd72d7a0c4417bf0b600000100f30f5c05faffff7f664a0f3a61b89b000000be", {}, 0x0, &(0x7f0000000240)="0f85050000000fc189a5f3c99967440fd982c0ae672a65f3450f522ac442bbf708c4621145715f362e0f0f524090e300c482312b63bd643e67660fae3f"}, 0x8, &(0x7f00000002c0)) [ 117.030398] kasan: CONFIG_KASAN_INLINE enabled [ 117.035055] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 117.042476] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 117.049213] Modules linked in: [ 117.052388] CPU: 0 PID: 5171 Comm: blkid Not tainted 4.14.87+ #20 [ 117.058592] task: ffff8881d49c0000 task.stack: ffff8881a0bf8000 [ 117.064633] RIP: 0010:bd_set_size+0x58/0x320 [ 117.069020] RSP: 0018:ffff8881a0bffc78 EFLAGS: 00010202 [ 117.074377] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1103a938105 [ 117.082292] RDX: 00000000000000a7 RSI: 0000000000000000 RDI: 0000000000000538 [ 117.089534] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [ 117.096778] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881ce413f40 [ 117.104021] R13: ffff8881ce413f40 R14: ffff8881c85c4a48 R15: ffff8881c85c4c28 [ 117.111265] FS: 00007fe4bbf66740(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 117.119463] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 117.125330] CR2: 000000000074b008 CR3: 00000001d5910002 CR4: 00000000001606b0 [ 117.132572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 117.139829] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 117.147068] Call Trace: [ 117.149647] loop_clr_fd+0x465/0xac0 [ 117.153337] ? lo_compat_ioctl+0x130/0x130 [ 117.157540] lo_release+0xfd/0x190 [ 117.161057] __blkdev_put+0x526/0x6e0 [ 117.164842] ? bd_set_size+0x320/0x320 [ 117.168702] ? locks_remove_file+0x2de/0x450 [ 117.173090] ? blkdev_put+0x4d0/0x4d0 [ 117.176874] ? blkdev_put+0x75/0x4d0 [ 117.180560] ? blkdev_put+0x4d0/0x4d0 [ 117.184330] blkdev_close+0x86/0xb0 [ 117.187932] __fput+0x25e/0x6f0 [ 117.191191] task_work_run+0x116/0x190 [ 117.195056] exit_to_usermode_loop+0x12e/0x150 [ 117.199618] do_syscall_64+0x35d/0x4b0 [ 117.203477] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 117.209253] RIP: 0033:0x7fe4bb86e2b0 [ 117.212936] RSP: 002b:00007ffea0844868 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 117.220613] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe4bb86e2b0 [ 117.228030] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 117.235359] RBP: 0000000000000000 R08: 0000000000000028 R09: 0000000001680000 [ 117.242611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000742030 [ 117.249854] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 117.257101] Code: 03 80 3c 02 00 0f 85 a4 02 00 00 49 8b 9c 24 e0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d bb 38 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 70 02 00 00 4d 8d 6c 24 08 48 8b 9b 38 05 00 [ 117.276151] RIP: bd_set_size+0x58/0x320 RSP: ffff8881a0bffc78 [ 117.282119] ---[ end trace 5d99bcff7f8950be ]--- [ 117.286894] Kernel panic - not syncing: Fatal exception [ 117.290858] SELinux: failed to load policy [ 117.297417] Kernel Offset: 0x6200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 117.308228] Rebooting in 86400 seconds..